CryptoDB
How to Protect Against a Militant Spammer
Authors: | |
---|---|
Download: | |
Abstract: | We consider how to avoid unsolicited e-mail -- so called spam -- in a stronger adversarial model than has previously been considered. Our primary concern is the proposal of an architecture and of protocols preventing against successful spamming attacks launched by a strong attacker. This attacker is assumed to control the communication media and to be capable of corrupting large numbers of protocol participants. Additionally, the same architecture can be used as a basis to support message integrity and privacy, though this is not a primary goal of our work. This results in a simple and efficient solution that is largely backwards-compatible, and which addresses many of the concerns surrounding e-mail communication. |
BibTeX
@misc{eprint-2003-11787, title={How to Protect Against a Militant Spammer}, booktitle={IACR Eprint archive}, keywords={applications / email, light-weight, spam}, url={http://eprint.iacr.org/2003/071}, note={N/A mjakobsson@rsasecurity.com 12157 received 15 Apr 2003}, author={Markus Jakobsson and John Linn and Joy Algesheimer}, year=2003 }