skip to main content
article
Free Access

How to avoid unwanted email

Published:01 March 1998Publication History
First page image

References

  1. 1 Blum, L., Blum, M., and Shub, M. A simple unpredictable pseudo-random number generator. SIAMJ. Comput. 15, 2 (May 1986), 364-383.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Borenstein, N., and Thyberg, C. Power, ease of use, and cooperative work in a practical multimedia message system. Int. J. Man-Machine Studies 34, 2 (Feb. 1991), 229-259.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Costales, B., Allman, E., and Rickert, N. Sendmail. O'Reilly & Assoc., Sebastopol, Calif., 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Garfinkel, S. PGP: Pretty Good Privacy. O'Reilly and Assoc., Sebastopol, Calif., 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 Greif, I. Desktop agents in group-enabled products. Commun. ACM 3 7, 7 (July 1994), 100-105.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 Hall, R. Channels: Avoiding unwanted electronic mail. In Proceedings of the 1996 DIMACS Symposium on Network Threats. American Mathematical Society, 1997; see ftp://.research.att.com/dist/hall/papers/ agents/channels-long.ps.]]Google ScholarGoogle Scholar
  7. 7 Myers, J., and Rose, M. Post office protocol, v.3. Network Working Group Request for Comments 1725 (RFC 1725, Nov. 1994); see also andrew2 .andrew.cmu. edu/rfc/rfc 1725]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Netscape Communications Corp. Netscape Navigator, v2.0 (or later); see home.netscape.com.]]Google ScholarGoogle Scholar
  9. 9 Postel, J. Simple mail transfer protocol. Network Working Group Request for Comments 1725 (Internet RFC 821, 1982); see www.cis.ohio-state.edu/htbin/rfc/rfc821 .html.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 RSA Data Security. S/MIME Central; see www.rsa.com/rsa/S-MIME.]]Google ScholarGoogle Scholar
  11. 11 Schneier, B. Applied Cryptography, 2nd Ed. John Wiley & Sons, New York, 1996.]]Google ScholarGoogle Scholar
  12. 12 Vocaltec. Welcome to Vocaltec: The Internet Phone Company; see www.vocaltec.com.]]Google ScholarGoogle Scholar

Index Terms

  1. How to avoid unwanted email

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 41, Issue 3
          March 1998
          100 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/272287
          Issue’s Table of Contents

          Copyright © 1998 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 March 1998

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader