Communications of the ACM
Consistent, yet anonymous, Web access with LPWA
Communications of the ACM
Anonymity and certification: e-mail, a case study
Proceedings of the 2004 ACM symposium on Applied computing
New client puzzle outsourcing techniques for DoS resistance
Proceedings of the 11th ACM conference on Computer and communications security
Moderately hard, memory-bound functions
ACM Transactions on Internet Technology (TOIT)
SELS: a secure e-mail list service
Proceedings of the 2005 ACM symposium on Applied computing
Security when people matter: structuring incentives for user behavior
Proceedings of the ninth international conference on Electronic commerce
Fighting unicode-obfuscated spam
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit
Anti-spam legislation: An analysis of laws and their effectiveness
Information and Communications Technology Law
An anti-spam scheme using pre-challenges
Computer Communications
An (almost) constant-effort solution-verification proof-of-work protocol based on Merkle trees
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
A counting-based method for massive spam mail classification
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Controlling spam by secure internet content selection
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Some fitting of naive bayesian spam filtering for japanese environment
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Hi-index | 0.03 |