Electronic mail

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

By Electronic Mail Only

This letter is submitted in response to the request of the Securities and Exchange Commission (the "Commission" or "SEC") for comments on the Concept Release on Equity Market Structure (the "Concept Release,,).l The undersigned firms engage, or have affiliates that engage, in automated trading on a proprietary basis and are interested in the inquiry being conducted by the Commission with respec...

متن کامل

Teaching through electronic mail

In November 1994 we (members of the former Human Cognition Research Laboratory) ran an experimental version of the Masters level course DM863, ‘Common Lisp for Artificial Intelligence,’ taught as far as possible entirely through the Internet. This report describes this course and outlines some of the experiences and ideas that evolved during this course. Introduction The intention behind this c...

متن کامل

Privacy-Enhanced Electronic Mail

The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based k...

متن کامل

Factoring by Electronic Mail

In this paper we describe our distributed implementation of two factoring algorithms. the elliptic curve method (ecm) and the multiple polynomial quadratic sieve algorithm (mpqs). Since the summer of 1987. our erm-implementation on a network of MicroVAX processors at DEC’s Systems Research Center has factored several most and more wanted numbers from the Cunningham project. In the summer of 198...

متن کامل

Multi-Destination Secure Electronic Mail

this solution has a flaw which in certain circumstances allows the malicious construction of apparently authentic messages. Finally note that it is not the intention of the author to criticise what is after all only an RFC,l but rather to ensure that possible solutions to multi-destination secure message authentication problems are analysed with care. There are many lessons to be learnt from th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Aesthetic Surgery Journal

سال: 1997

ISSN: 1090-820X

DOI: 10.1016/s1090-820x(97)80014-3