Schneier (Applied Cryptography, second edition, John Wiley and sons, Inc. Sep. 1996).* |
R. J. Hall, How to Avoid Unwanted Email, Communications of the ACM, Mar. 1998, vol. 41, No. 3, pp. 88-95. |
E. Gabber, et al., Curbing Junk E-Mail via Secure Classification, in or after May 1998, p. 1-2. |
R.J. Hall, Channels: Avoiding Unwanted Electronic Mail, American Mathematical Society, 1997, p. 1-17. |
A. Arensburger, et al., To Take Arms Against a Sea of Email, Communication of the ACM, Mar. 1995, vol. 38, No. 3, pp. 108-109. |
T. Bass, et al., A Simple Framework for Filtering Queued SMTP Mail (Cyberwar Countermeasures), MILCOM 97 Proceedings, Nov. 5, 1997, vol. 3, pp. 1140-1144. |
L. Blum, et al., A Simple Unpredictable Pseudo-Random Number Generator, Siam Journal On Computing, May 1986, vol. 15, No. 2, pp. 364-383. |
Nist, The Digital Standard Signature Standard, Communications of the Law, Jul. 1992, vol. 35, No. 7, pp. 36-40. |
C. Dwork, et al., Pricing Via Processing or Combatting Junk Mail, Proc. of Crypto, Aug. 1992, pp. 39-145. |
Y. Matias, et al., Lightweight Security Primitives of E-Commerce, in or after Jun. 1997, p. 1-8. |
D. Bleichenbacher, et al. On Secure and Pseudonymous Client-Relationships with Multiple Servers, May 1998, p. 1-14. |
W. Diffie, The First Ten Years of Public-Key Cryptography, Proceedings of the IEEE, vol. 76, No. 5, May 1988, p. 560-577. |
M. Wagner, Cyber Junk, Computerworld, Aug. 26, 1996, vol. 30, No. 35, p. 28. |
B. Cole-Gomolski, Message Managers Aim to Control Junk E-mail, Computerworld, May 5, 1997, vol. 31, No. 18. |
G. Faulkner, A New and Nasty Way to Flood Networks with Spam, Lantimes, <http://www.lantimes.com/97/97sep/709c040a.html>, Sep. 1997. |
P. Collinson, Putting a Stop to Spam, Centaur Communications EXE, Nov. 3, 1997. |
Table of Contents, Choking on Spam, Nov. 1997, vol. 17, No. 13, p. 105. |
Communications Software, Help Block Spam, Dec. 1997, vol. 10, No. 12, p. 286. |
PC/Computing, Spam Killers, Dec. 1997, vol. 10, No. 12, p. 433. |
D. Blankenhorn, Datamation, You Can Win The War Against Spam!, <http://www.datamation.com/PlugIn/issues/1998/august/08web.html>, Aug. 1998. |
E. Gabber, et al., How to Make Personalized Web Browsing Simple, Secure, and Anonymous, Feb. 1997, p. 1-16. |
The Lucent Personalized Web Assistant, A Bell Labs Technology Demonstration, <http://www.bell-labs.com/projects/lpwa/>, on or after Jun. 1997, p. 1-2. |
News & Info, News Release, Lucent Technologies Introduces Technology That Protects Net Surfers' Privacy, <http://www.lucent.com/press/0697/9706.bla.html>, Jun. 10, 1997, p. 1-2. |
M. Stutz, WIREDNEWS, Covering Your Tracks via a Helping Hand, <http://www.wired.com/news/technology/story/4375.html>, Jun. 10, 1997, p. 1-3. |
Lucent Introduces Personal Protection Technology, News Watch, <http://www.zdnet.com/icom/news/199706/12/news2.html>, Jun. 12, 1997, p. 1-2. |
a2i(rahul.net) anti-junk-email-features, <http://www.rahul.net/guest/nojunk.html>, 1998, p. 1-2. |
a2i-nojunk—anti-junk-email system, <http://www.rahul.net/gu7est/a2i-nojunk.1.txt>, date unknown, p. 1-16. |
P.G. Neumann, Risks in Digital Commerce, Communications of the ACM, Jan. 1996, vol. 39, No. 1, p. 154. |
N. Asokan, et al., The State of the Art in Electronic Payment Systems, Computer, The Future of Micro Processors, Sep. 1997, pp. 28-35. |