-
1
E-mail authentication what, why, how?.
Published in ACM queue : architecting tomorrow's computing. (2006)Article -
2
-
3
-
4
Fighting spam with reputation systems.
Published in ACM queue : architecting tomorrow's computing. (2005)Article -
5
A conversation with Phil Smoot.
Published in ACM queue : architecting tomorrow's computing. (2005)Article -
6
-
7
What's on your hard drive?.
Published in ACM queue : architecting tomorrow's computing. (2005)Article -
8
Routing reserved bandwith multi-point connections.
Published in Computer communication review.Article -
9
Identifying spam without peeking at the contents.
Published in Crossroads : the ACM student magazine.Article -
10
Peer to peer collaborative spam detection.
Published in Crossroads : the ACM student magazine.Article