J. Klensin, Simple Mail Transfer Protocol, RFC5321, 2008.
DOI : 10.17487/rfc5321

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.8066

M. Rose, SMTP Service Extensions, RFC 1425, 1993.
DOI : 10.17487/rfc1425

D. Ritchie and K. Thompson, The UNIX Time-Sharing System. The Bell System Technical Journal, 1978.

M. Crispin, Internet Message Access Protocol ? Version 4rev1, RFC, vol.3501, 2003.
DOI : 10.17487/rfc2060

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.179.184

J. Park, E. Chong, and H. Siegel, Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures, Proceedings of the twenty-second annual symposium on Principles of distributed computing , PODC '03, pp.172-181, 2003.
DOI : 10.1145/872035.872060

H. Wang, Y. Ou, J. Ling, X. Xu, and H. Guo, A New Certified Email Protocol, 18th International Conference on Database and Expert Systems Applications (DEXA 2007), pp.683-687, 2007.
DOI : 10.1109/DEXA.2007.117

J. Cederquist, M. T. Dashti, and S. Mauw, A Certified Email Protocol Using Key Chains, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.525-530, 2007.
DOI : 10.1109/AINAW.2007.10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.7962

Z. Liu, J. Pang, and C. Zhang, Extending a Key-Chain Based Certified Email Protocol with Transparent TTP, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.630-636, 2010.
DOI : 10.1109/EUC.2010.101

J. Jang, S. Nepal, and J. Zic, Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries, 8th IEEE International Conference on Computer and Information Technology, pp.402-408, 2008.

J. Zhang and H. Chen, An improved password-based authenticated email protocol, 2010 2nd IEEE International Conference on Information Management and Engineering, pp.545-549, 2010.
DOI : 10.1109/ICIME.2010.5477942

J. Zhang and H. Chen, An Efficient Identity-Based Authenticated Email Protocol with Perfect Forward Secrecy, 2010 International Forum on Information Technology and Applications, pp.68-71, 2010.

D. Zisiadis, S. Kopsidas, A. Varalis, and L. Tassiulas, Mailbook: A social network against spamming, 2011 International Conference for Internet Technology and Secured Transactions, pp.245-249, 2011.

A. R. Mathew, A. Hajj, A. , A. Ruqeishi, and K. , Cyber crimes: Threats and protection, 2010 International Conference on Networking and Information Technology, pp.16-18, 2010.
DOI : 10.1109/ICNIT.2010.5508568

D. Zhenhai, C. Peng, F. Sanchez, D. Yingfei, M. Stephenson et al., Detecting Spam Zombies by Monitoring Outgoing Messages, The 28th Conference on Computer Communications, pp.1764-1772, 2009.

J. Jung and E. Sit, An empirical study of spam traffic and the use of DNS black lists, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04, pp.370-375, 2004.
DOI : 10.1145/1028788.1028838

H. Esquivel, A. Akella, and T. Mori, On the effectiveness of IP reputation for spam filtering, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010), pp.1-10, 2010.
DOI : 10.1109/COMSNETS.2010.5431981

E. P. Sanz, J. M. Hidalgo, and J. C. Pérez, Chapter 3 Email Spam Filtering, In: Advances in computers, vol.74, pp.45-114, 2008.
DOI : 10.1016/S0065-2458(08)00603-7

. Wikipedia, wikipedia.org/wiki/CAPTCHA 25. The Official CAPTCHA site, www.captcha.net 26. Wikipedia

M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz, A Bayesian approach to filtering junk e-mail, AAAI Workshop on Learning for Text Categorization, pp.55-62, 1998.

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, P2P-based collaborative spam detection and filtering, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., pp.176-183, 2004.
DOI : 10.1109/PTP.2004.1334945

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.123