Pricing via Processing or Combatting Junk Mail
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Designing human friendly human interaction proofs (HIPs)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Spam and the ongoing battle for the inbox
Communications of the ACM - Spam and the ongoing battle for the inbox
DMTP: Controlling spam through message delivery differentiation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trespass, nuisance, and spam: 11th century common law meets the internet
Communications of the ACM
A mailbox ownership based mechanism for curbing spam
Computer Communications
Spamalytics: an empirical analysis of spam marketing conversion
Proceedings of the 15th ACM conference on Computer and communications security
A spam rejection scheme during SMTP sessions based on layer-3 e-mail classification
Journal of Network and Computer Applications
Targeting spam control on middleboxes: Spam detection based on layer-3 e-mail content classification
Computer Networks: The International Journal of Computer and Telecommunications Networking
Spamalytics: an empirical analysis of spam marketing conversion
Communications of the ACM - The Status of the P versus NP Problem
On Automatically Detecting Malicious Impostor Emails
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
A survey of learning-based techniques of email spam filtering
Artificial Intelligence Review
Multilateral decisions for collaborative defense against unsolicited bulk e-mail
iTrust'06 Proceedings of the 4th international conference on Trust Management
DMTP: controlling spam through message delivery differentiation
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
Building segmentation based human-friendly human interaction proofs (HIPs)
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Packet-level open-digest fingerprinting for spam detection on middleboxes
International Journal of Network Management
Establishing trust between mail servers to improve spam filtering
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.02 |
We analyze the problem of preventing outgoing spam. We show that some conventional techniques for limiting outgoing spam are likely to be ineffective. We show that while imposing per message costs would work, less annoying techniques also work. In particular, it is only necessary that the average cost to the spammer over the lifetime of an account exceed his profits, meaning that not every message need be challenged. We develop three techniques, one based on additional HIP challenges, one based on computational challenges, and one based on paid subscriptions. Each system is designed to impose minimal costs on legitimate users, while being too costly for spammers. We also show that maximizing complaint rates is a key factor, and suggest new standards to encourage high complaint rates.