sendmail
Tcl and the Tk toolkit
Communications of the ACM
Communications of the ACM
SIGIR '00 Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval
The qmail handbook
An introduction to the Spambayes project
Linux Journal
A statistical approach to the spam problem
Linux Journal
netWorker - SPAM! putting an end to a costly scourge
IBM Systems Journal
A comparison of event models for Naive Bayes anti-spam e-mail filtering
EACL '03 Proceedings of the tenth conference on European chapter of the Association for Computational Linguistics - Volume 1
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
SF-HME system: a hierarchical mixtures-of-experts classification system for spam filtering
Proceedings of the 2006 ACM symposium on Applied computing
DMTP: Controlling spam through message delivery differentiation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the ninth international conference on Electronic commerce
Thwarting E-mail Spam Laundering
ACM Transactions on Information and System Security (TISSEC)
Journal of Computer Security
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
A survey of emerging approaches to spam filtering
ACM Computing Surveys (CSUR)
Classification of textual E-mail spam using data mining techniques
Applied Computational Intelligence and Soft Computing
Hi-index | 0.00 |
We present an effective method of eliminating unsolicited electronic mail (so-called spam) and discuss its publicly accessible prototype implementation. A subscriber to our system is able to obtain an unlimited number of aliases of his/her permanent (protected) E-Mail address to be handed out to parties willing to communicate with the subscriber. It is also possible to set up publishable aliases, which can be used by human correspondents to contact the subscriber, while being useless to harvesting robots and spammers. The validity of an alias can be easily restricted to a specific duration in time, a specific number of received messages, a specific population of senders, and/or in other ways. The system is fully compatible with the existing E-Mail infrastructure and can be immediately accessed via any standard E-Mail client software (MUA). It can be easily deployed at any institution or organization running its private E-Mail server (MTA) with a trivial modification to that server. Our system offers a simple method to salvage the existing population of E-Mail addresses while eliminating all spam aimed at them.