2005
DOI: 10.1007/11599548_8
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing Email Addresses Privacy Using Tokens

Abstract: Abstract. We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the SPAM phenomenon. Our solution does not require changes to the email infrastructure, can be set up by the end user on an individual basis and is compatible with any email client as long as emails are centralized on a server (e.g. an IMAP server). Nevertheless, it requires that people use email messaging quite differently.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2006
2006
2006
2006

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Apart from the mentioned technologies in section 2.1 and section 2.2, there are several other proposals on how to prevent spam. Such proposals include use of tokens (Schlegel, 2005), challenge-response schemes (Spamarrest), pre-challenge schemes (Roman, 2005), graylisting (Harris, 2004), domain-based email authentication (Delany, 2005) and encapsulation of policy in email addresses (Ioannidis, 2003). Password-based systems (Cranor, 1998) and micropayment systems (Abadi, 2003) have also been proposed.…”
Section: Filtering Techniquesmentioning
confidence: 99%
“…Apart from the mentioned technologies in section 2.1 and section 2.2, there are several other proposals on how to prevent spam. Such proposals include use of tokens (Schlegel, 2005), challenge-response schemes (Spamarrest), pre-challenge schemes (Roman, 2005), graylisting (Harris, 2004), domain-based email authentication (Delany, 2005) and encapsulation of policy in email addresses (Ioannidis, 2003). Password-based systems (Cranor, 1998) and micropayment systems (Abadi, 2003) have also been proposed.…”
Section: Filtering Techniquesmentioning
confidence: 99%