Sciweavers

119 search results - page 12 / 24
» Decentralized Electronic Mail
Sort
View
WOWMOM
2006
ACM
118views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Towards Blocking Outgoing Malicious Impostor Emails
Electronic mails (emails) have become an indispensable part of most people’s daily routines. However, they were not designed for deployment in an adversarial environment, which ...
Erhan J. Kartaltepe, Shouhuai Xu
POLICY
2004
Springer
14 years 27 days ago
Towards a Multi-dimensional Characterization of Dissemination Control
Dissemination control (DCON) is emerging as one of the most important and challenging goals for information security. DCON is concerned with controlling information and digital ob...
Roshan K. Thomas, Ravi S. Sandhu
HICSS
2003
IEEE
111views Biometrics» more  HICSS 2003»
14 years 25 days ago
Modeling the User Acceptance of E-Mail
The Technology Acceptance Model (TAM) predicts whether users will ultimately use software applications based upon causal relationships among belief and attitudinal constructs that...
Geoffrey S. Hubona, Andrew Burton-Jones
FSTTCS
2003
Springer
14 years 23 days ago
Moderately Hard Functions: From Complexity to Spam Fighting
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the ...
Moni Naor
CEC
2003
IEEE
13 years 11 months ago
Increasing the accuracy of a spam-detecting artificial immune system
AbstractSpam, the electronic equivalent of junk mail, affects over 600 million users worldwide. Even as anti-spam solutions change to limit the amount of spam sent to users, the se...
Terri Oda, Tony White