A. Arensburger, et al., To Take Arms Against a Sea of Email, Communication of the ACM, Mar. 1995, vol. 38, No. 3, pp. 108-109. |
T. Bass, et al., A Simple Framework for Filtering Queued SMTP Mail (Cyberwar Countermeasures), MILCOM 97 Proceedings, Nov. 5, 1997, vol. 3, pp. 1140-1144. |
M. Wagner, Cyber Junk, Computerworld, Aug. 26, 1996, vol. 30, No. 35, p. 28. |
B. Cole-Gomolski, Message Managers Aim to Control Junk E-mail, Computerworld, May 5, 1997, vol. 31, No. 18. |
G. Faulkner, A New and Nasty Way to Flood Networks with Spam, Lantimes, <http://www.lantimes.com/97/97sep/709c040a.htm1>, Sep. 1997. |
P. Collinson, Putting a Stop to Spam, Centaur Communications EXE, Nov. 3, 1997. |
Table of Contents, Choking on Spam, Nov. 1997, vol. 17, No. 13, p. 105. |
Communications Software, Help Block Spam, Dec. 1997, vol. 10, No. 12, p. 286. |
PC/Computing, Spam Killers, Dec. 1997, vol. 10, No. 12, p. 433. |
D. Blankenhorn, Datamation, You Can Win The War Against Spam!, <http://www.datamation.com/PlugIn/issues/1998/august/08web.htm1>, Aug. 1998. |
E. Gabber, et al., How to Make Personalized Web Browsing Simple, Secure, and Anonymous, Feb. 1997. pp. 1-16. |
The Lucent Personalized Web Assistant, A Bell Labs Technology Demonstration, <http://www.bell-labs.com/projects/lpwa/>, on or after Jun. 1997, pp. 1-2. |
News & Info, News Release, Lucent Technologies Introduces Technology That Protects Net Surfers' Privacy, <http://www.lucent.com/press/0697/9706.bla.htm1>, Jun. 10, 1997, pp. 1-2. |
M. Stutz, WIREDNEWS, Covering Your Tracks via a Helping Hand, <http://www.zdnet.com/icom/news/199706/12/news2.htm>, Jun. 10, 1997, pp. 1-3. |
Lucent Introduces Personal Protection Technology, News Watch, <http://www.zdnet.com/icom/news/199706/12news2.htm1>, Jun. 12, 1997, pp. 1-2. |
a2i(rahul.net) anti-junk-email-features, <http://www.rahul.net/guest/nojunk.htm1>, 1998, pp. 1-2. |
a2i-nojunk-—anti-junk-email system, <http://www.rahul.net/gu7est/a2i-nojunk.1.txt>, date unknown, pp. 1-16. |
L.F. Crano, et al., SPAM!, Communications of the ACM, Aug. 1998, vol. 41, No. 8, pp. 74-83. |
L. Blum, et al., A Simple Unpredictable Pseudo-Random Number Generator, Siam Journal On COmputing, May 1986, vol. 15, No. 2, pp. 364-383. |
Nist, The Digital Standard Signature Standard, Communications of the Law, Jul. 1992, vol. 35, No. 7, pp. 36-40. |
C. Dwork, et al., Princing Via Processing or Combatting Junk Mail, Proc. of Crypto, Aug. 1992, pp. 39-145. |
W. Diffie, The First Ten Years of Public-Key Cryptography, Proceedings of the IEEE, May 1988, pp. 560-577. |
D. Bleichenbacher, On Secure and Pseudonymous Client-Relationships With Multiple Servers, May 28, 1998, pp. 1-14. |
Y. Matias et al., Lightweight Security Primitives for E-Commerce, date unknown, pp. 1-8. |
R.J. Hall, How to Avoid Unwanted Email, Communications of the ACM, Mar. 1998, vol. 41, No. 3, pp. 88-95. |
R.J. Hall, Channels: Avoiding Unwanted Electronic Mail, American Mathematical Society, 1997, pp. 1-17. |
E. Gabber, et al., Curbing Junk E-Mail via Secure Classification, in or after May 1998, pp. 1-12. |