-
1
E-mail authentication what, why, how?.
Publicat a ACM queue : architecting tomorrow's computing. (2006)Article -
2
-
3
-
4
Fighting spam with reputation systems.
Publicat a ACM queue : architecting tomorrow's computing. (2005)Article -
5
A conversation with Phil Smoot.
Publicat a ACM queue : architecting tomorrow's computing. (2005)Article -
6
-
7
What's on your hard drive?.
Publicat a ACM queue : architecting tomorrow's computing. (2005)Article -
8
Routing reserved bandwith multi-point connections.
Publicat a Computer communication review.Article -
9
-
10
Peer to peer collaborative spam detection.
Publicat a Crossroads : the ACM student magazine.Article