Sciweavers

377 search results - page 3 / 76
» Factoring by Electronic Mail
Sort
View
DGO
2003
118views Education» more  DGO 2003»
13 years 8 months ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel
IKE
2004
13 years 8 months ago
Analyzing Large Collections of Email
One of the first applications of the Internet was the electronic mailing (e-mail). Along with the evolution of the Internet, e-mail has evolved into a powerful and popular technolo...
Daniel A. Keim, Christian Panse, Jörn Schneid...
CCS
2006
ACM
13 years 11 months ago
Certified mailing lists
Email List Services (or simply, mailing lists) are becoming increasingly common for collaborative computing. In order to enable their use for official purposes with increased effe...
Himanshu Khurana, Hyung-Seok Hahm
AICT
2006
IEEE
104views Communications» more  AICT 2006»
13 years 9 months ago
An Automation of Mail Channels
Mail channels allow an electronic mail (e-mail) user to have multiple points of contact, each with a potentially different policy. For example, a user may have two channels, one fo...
Nicholas M. Boers, Pawel Gburzynski
SAINT
2003
IEEE
14 years 22 days ago
Identifying Junk Electronic Mail in Microsoft Outlook with a Support Vector Machine
In this paper, we utilize a simple support vector machine to identify commercial electronic mail. The use of a personalized dictionary for model training provided a classification...
Matthew Woitaszek, Muhammad Shaaban, Roy Czernikow...