<--- Back to Details
First PageDocument Content
Spam filtering / Computing / Spamming / Cyberspace / Email / Anti-spam techniques / Email spam / Challengeresponse spam filtering / DomainKeys Identified Mail / Hashcash / Whitelist / Sender Policy Framework
Date: 2009-05-20 11:13:17
Spam filtering
Computing
Spamming
Cyberspace
Email
Anti-spam techniques
Email spam
Challengeresponse spam filtering
DomainKeys Identified Mail
Hashcash
Whitelist
Sender Policy Framework

CentMail: Rate Limiting via Certified Micro-Donations Sharad Goel Jake Hofman David M. Pennock

Add to Reading List

Source URL: hunch.net

Download Document from Source Website

File Size: 235,58 KB

Share Document on Facebook

Similar Documents

PDF Document

DocID: 1xkGU - View Document

PDF Document

DocID: 1vu76 - View Document

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

DocID: 1tZYw - View Document

STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

DocID: 1tVKg - View Document