- 
              
            1
E-mail authentication what, why, how?.
Pubblicato in ACM queue : architecting tomorrow's computing. (2006)Articolo - 
              
            2
 - 
              
            3
 - 
              
            4
Fighting spam with reputation systems.
Pubblicato in ACM queue : architecting tomorrow's computing. (2005)Articolo - 
              
            5
A conversation with Phil Smoot.
Pubblicato in ACM queue : architecting tomorrow's computing. (2005)Articolo - 
              
            6
 - 
              
            7
What's on your hard drive?.
Pubblicato in ACM queue : architecting tomorrow's computing. (2005)Articolo - 
              
            8
Routing reserved bandwith multi-point connections.
Pubblicato in Computer communication review.Articolo - 
              
            9
Identifying spam without peeking at the contents.
Pubblicato in Crossroads : the ACM student magazine.Articolo - 
              
            10
Peer to peer collaborative spam detection.
Pubblicato in Crossroads : the ACM student magazine.Articolo