Simple Mail Transfer Protocol, RFC5321, 2008. ,
DOI : 10.17487/rfc5321
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.8066
SMTP Service Extensions, RFC 1425, 1993. ,
DOI : 10.17487/rfc1425
The UNIX Time-Sharing System. The Bell System Technical Journal, 1978. ,
Internet Message Access Protocol ? Version 4rev1, RFC, vol.3501, 2003. ,
DOI : 10.17487/rfc2060
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.179.184
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures, Proceedings of the twenty-second annual symposium on Principles of distributed computing , PODC '03, pp.172-181, 2003. ,
DOI : 10.1145/872035.872060
A New Certified Email Protocol, 18th International Conference on Database and Expert Systems Applications (DEXA 2007), pp.683-687, 2007. ,
DOI : 10.1109/DEXA.2007.117
A Certified Email Protocol Using Key Chains, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.525-530, 2007. ,
DOI : 10.1109/AINAW.2007.10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.7962
Extending a Key-Chain Based Certified Email Protocol with Transparent TTP, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.630-636, 2010. ,
DOI : 10.1109/EUC.2010.101
Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries, 8th IEEE International Conference on Computer and Information Technology, pp.402-408, 2008. ,
An improved password-based authenticated email protocol, 2010 2nd IEEE International Conference on Information Management and Engineering, pp.545-549, 2010. ,
DOI : 10.1109/ICIME.2010.5477942
An Efficient Identity-Based Authenticated Email Protocol with Perfect Forward Secrecy, 2010 International Forum on Information Technology and Applications, pp.68-71, 2010. ,
Mailbook: A social network against spamming, 2011 International Conference for Internet Technology and Secured Transactions, pp.245-249, 2011. ,
Cyber crimes: Threats and protection, 2010 International Conference on Networking and Information Technology, pp.16-18, 2010. ,
DOI : 10.1109/ICNIT.2010.5508568
Detecting Spam Zombies by Monitoring Outgoing Messages, The 28th Conference on Computer Communications, pp.1764-1772, 2009. ,
An empirical study of spam traffic and the use of DNS black lists, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04, pp.370-375, 2004. ,
DOI : 10.1145/1028788.1028838
On the effectiveness of IP reputation for spam filtering, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010), pp.1-10, 2010. ,
DOI : 10.1109/COMSNETS.2010.5431981
Chapter 3 Email Spam Filtering, In: Advances in computers, vol.74, pp.45-114, 2008. ,
DOI : 10.1016/S0065-2458(08)00603-7
wikipedia.org/wiki/CAPTCHA 25. The Official CAPTCHA site, www.captcha.net 26. Wikipedia ,
A Bayesian approach to filtering junk e-mail, AAAI Workshop on Learning for Text Categorization, pp.55-62, 1998. ,
P2P-based collaborative spam detection and filtering, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., pp.176-183, 2004. ,
DOI : 10.1109/PTP.2004.1334945
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.123