- 1 Blum, L., Blum, M., and Shub, M. A simple unpredictable pseudo-random number generator. SIAMJ. Comput. 15, 2 (May 1986), 364-383.]] Google ScholarDigital Library
- 2 Borenstein, N., and Thyberg, C. Power, ease of use, and cooperative work in a practical multimedia message system. Int. J. Man-Machine Studies 34, 2 (Feb. 1991), 229-259.]] Google ScholarDigital Library
- 3 Costales, B., Allman, E., and Rickert, N. Sendmail. O'Reilly & Assoc., Sebastopol, Calif., 1993.]] Google ScholarDigital Library
- 4 Garfinkel, S. PGP: Pretty Good Privacy. O'Reilly and Assoc., Sebastopol, Calif., 1995.]] Google ScholarDigital Library
- 5 Greif, I. Desktop agents in group-enabled products. Commun. ACM 3 7, 7 (July 1994), 100-105.]] Google ScholarDigital Library
- 6 Hall, R. Channels: Avoiding unwanted electronic mail. In Proceedings of the 1996 DIMACS Symposium on Network Threats. American Mathematical Society, 1997; see ftp://.research.att.com/dist/hall/papers/ agents/channels-long.ps.]]Google Scholar
- 7 Myers, J., and Rose, M. Post office protocol, v.3. Network Working Group Request for Comments 1725 (RFC 1725, Nov. 1994); see also andrew2 .andrew.cmu. edu/rfc/rfc 1725]] Google ScholarDigital Library
- 8 Netscape Communications Corp. Netscape Navigator, v2.0 (or later); see home.netscape.com.]]Google Scholar
- 9 Postel, J. Simple mail transfer protocol. Network Working Group Request for Comments 1725 (Internet RFC 821, 1982); see www.cis.ohio-state.edu/htbin/rfc/rfc821 .html.]] Google ScholarDigital Library
- 10 RSA Data Security. S/MIME Central; see www.rsa.com/rsa/S-MIME.]]Google Scholar
- 11 Schneier, B. Applied Cryptography, 2nd Ed. John Wiley & Sons, New York, 1996.]]Google Scholar
- 12 Vocaltec. Welcome to Vocaltec: The Internet Phone Company; see www.vocaltec.com.]]Google Scholar
Index Terms
- How to avoid unwanted email
Recommendations
Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted Email
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing SystemsA large proportion of email messages in an average Internet user's inbox are unwanted commercial messages from mailing lists, bots, and so on. Although such messages often include instructions to unsubscribe, people still struggle with stopping unwanted ...
Email training significantly reduces email defects
Organisations are now becoming aware of the problems associated with email use and are keen to reduce these defects. These email defects relate to the ineffective way that email is used within organisations, and are not only limited to the volume of ...
Comments