Automated verification of selected equivalences for security protocols
In the analysis of security protocols, methods and tools for reasoning about protocol
behaviors have been quite effective. We aim to expand the scope of those methods and …
behaviors have been quite effective. We aim to expand the scope of those methods and …
Filtering spam with behavioral blacklisting
Spam filters often use the reputation of an IP address (or IP address range) to classify email
senders. This approach worked well when most spam originated from senders with fixed IP …
senders. This approach worked well when most spam originated from senders with fixed IP …
Moderately hard, memory-bound functions
A resource may be abused if its users incur little or no cost. For example, e-mail abuse is
rampant because sending an e-mail has negligible cost for the sender. It has been …
rampant because sending an e-mail has negligible cost for the sender. It has been …
Email spam filtering
EP Sanz, JMG Hidalgo, JCC Pérez - Advances in computers, 2008 - Elsevier
In recent years, email spam has become an increasingly important problem, with a big
economic impact in society. In this work, we present the problem of spam, how it affects us …
economic impact in society. In this work, we present the problem of spam, how it affects us …
[图书][B] Online social networks: measurement, analysis, and applications to distributed information systems
AE Mislove - 2009 - search.proquest.com
Recently, online social networking sites have exploded in popularity. Numerous sites are
dedicated to finding and maintaining contacts and to locating and sharing different types of …
dedicated to finding and maintaining contacts and to locating and sharing different types of …
Privacy and accountability for location-based aggregate statistics
A significant and growing class of location-based mobile applications aggregate position
data from individual devices at a server and compute aggregate statistics over these position …
data from individual devices at a server and compute aggregate statistics over these position …
[PDF][PDF] Ostra: Leveraging Trust to Thwart Unwanted Communication.
Online communication media such as email, instant messaging, bulletin boards, voice-over-
IP, and social networking sites allow any sender to reach potentially millions of users at near …
IP, and social networking sites allow any sender to reach potentially millions of users at near …
Survey of attacks and defenses on P2PSIP communications
DS Touceda, JM Sierra, A Izquierdo… - … Surveys & Tutorials, 2011 - ieeexplore.ieee.org
As with any other emerging system, the analysis of the security of Peer-to-Peer Session
Initiation Protocol systems is of crucial importance for its secure development and future …
Initiation Protocol systems is of crucial importance for its secure development and future …
[PDF][PDF] Voice over IP-security and SPIT
R Baumann, S Cavin, S Schmid - Swiss Army, FU Br, 2006 - rainer.baumann.info
Abstract Voice-over-IP (VoIP) has become an attractive alternative to the plain old telephone
system, especially due to the much lower communication costs. However, there are several …
system, especially due to the much lower communication costs. However, there are several …
An economic response to unsolicited communication
T Loder, M Van Alstyne, R Wash - Advances in Economic Analysis & …, 2006 - degruyter.com
If communication involves some transactions cost to both sender and recipient, what policy
ensures that correct messages--those with positive social surplus-get sent? Filters block …
ensures that correct messages--those with positive social surplus-get sent? Filters block …