Revisiting the decay of scientific email addresses

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Email addresses to contact persons

page 22 tion point that a majority of the traffic to and from the Internet will pass through. What is still unknown is how to handle 4, or 6, or more really fast ATM links that all end up at SUNET Stockholm (since we start off with 34 Mbit/s leased lines as of today, 34 Mbit/s ATM is below the very minimum). What kind of switching equipment is needed? What kind of routing equipment? [6] Moldekl...

متن کامل

IP Addresses in Email Clients

IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes. While it is trivial to find the sender’s IP address in most email server software, it turns out to be surprisingly difficult to do so in email client software: we explain why. This implies that either alternative approaches are needed (typically signature-based) or tha...

متن کامل

Making Sense of Email Addresses on Drives

Drives found during investigations often have useful information in the form of email addresses, which can be acquired by search in the raw drive data independent of the file system. Using these data, we can build a picture of the social networks in which a drive owner participated, even perhaps better than investigating their online profiles maintained by social-networking services, because dr...

متن کامل

Inexpensive Email Addresses An Email Spam-Combating System

This work proposes an effective method of fighting spam by developing Inexpensive Email Addresses (IEA), a stateless system of Disposable Email Addresses (DEAs). IEA can cryptographically generate exclusive email addresses for each sender, with the ability to re-establish a new email address once the old one is compromised. IEA accomplishes proof-of-work by integrating a challenge-response mech...

متن کامل

Revisiting Email Spoofing Attacks

The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face key challenges to authenticate incoming emails. As a result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks. In this work, we study email spoofing to answer three key questions: (1) How do email pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Association for Information Science and Technology

سال: 2021

ISSN: 2330-1635,2330-1643

DOI: 10.1002/asi.24545