Friday 26 October 2012

1. Campbell, K.K. A NET.CONSPIRACY SO IMMENSE...Chatting With
Martha Siegel of the Internet’s Infamous Canter & Siegel. CuD 6.89, Oct.
1, 1994; www.eff.org/pub/Legal/Cases/ Canter_Siegel/c-and-s_summary.
article
2. Denning, P. Electronic junk. Commun. ACM 3, 25 (Mar. 1982),
163–165.
3. Dwork, C. and Naor, M. Pricing via processing or combating junk mail.
Advances in Cryptology—Crypto ‘92. E. Brickell, Ed. Lecture notes in computer
science 740. Springer–Verlag, NY (1993), 139–147.
4. Federal Trade Commission Consumer Information Privacy Workshop.
Transcripts and public comments available at
www.ftc.gov/bcp/privacy2/index.html (June 10–13, 1997).
5. Gabber, E., Jakobsson, M., Matias, Y., and Mayer, A. Curbing junk
E-mail via secure classification. In Proceedings of Financial Cryptography
‘98. (Feb. 23–25, 1998, Anguilla, BWI).
6. Hall, R.J. How to avoid unwanted email. Commun. ACM 3, 41 (Mar.
1998). Also available from ftp://ftp.research.att.com/dist/hall/
papers/agents/channels-long.ps.
7. Lucent Personal Web Assistant. lpwa.com.
8. Postel, J. On the junk mail problem. Network Working Group
Request for Comments: 706,

No comments:

Post a Comment