next up previous
: Push vs. Pull: Implications : Summary

References

1
CLABURN, T.
Big guns aim at spam.
Information Week (Mar. 2004).

2
DELANY, M.
Domain-based email authentication using public-keys avertised in the DNS (domainkeys).
Internet Draft (Aug. 2004).
[draft-delany-domainkeys-base-01.txt].

3
DUAN, Z., DONG, Y., AND GOPALAN, K.
DiffMail: A differentiated message delivery architecture to control spam.
Tech. Rep. TR-041025, Department of Computer Science, Florida State University (Oct. 2004).

4
DUAN, Z., GOPALAN, K., AND DONG, Y.
Receiver-driven extensions to SMTP.
Internet Draft (May 2005).
[draft-duan-smtp-receiver-driven-00.txt].

5
FU, K.
Personal communication.
MIT, (Mar. 2005).

6
GOMES, L., CAZITA, C., ALMEIDA, J., ALMEIDA, V., AND MEIRA, W.
Charactering a spam traffic.
In Proceedings of IMC'04 (Oct. 2004).

7
GRAHAM, P.
A plan for spam
.
http://www.paulgraham.com/spam.html (2003).

8
JUELS, A., AND BRAINARD, J.
Client puzzles: A cryptographic defense against connection depletion attacks.
In Proceedings of NDSS-1999 (Networks and Distributed Security Systems) (Feb. 1999).

9
KLENSIN, J.
Simple mail transfer protocol.
RFC 2821 (Apr. 2001).

10
LAURIE, B., AND CLAYTON, R.
"Proof-of-Work" proves not to work.
http://www.apache-ssl.org/proofwork.pdf (May 2004).

11
LYON, J., AND WONG, M.
Sender ID: Authenticating e-mail.
Internet Draft (Aug. 2004).
[draft-ietf-marid-core-03.txt].

12
RBL.
Real-time spam black lists (RBL).
http://www.email-policy.com/Spam-black-lists.htm.

13
RISHI, V.
Free lunch ends: e-mail to go paid.
The Economic Times (Feb. 2004).

14
SANDVINE INCORPORATED.
Trend analysis: Spam trojans and their impact on broadband service providers (June 2004).

15
THE WASHINGTON POST.
FCC sets sights on mobile phone spam (Mar. 2004).