نتایج جستجو برای: e mail

تعداد نتایج: 1026691  

Journal: :it - Information Technology 2017
Sai Prashanth Chandramouli Ziming Zhao Adam Doupé Gail-Joon Ahn

E-mail Header Injection vulnerability is a class of vulnerability that can occur inweb applications that use user input to construct e-mailmessages. E-mail Header Injection is possiblewhen themailing script fails to check for the presence of e-mail headers in user input (either form fields or URL parameters). The vulnerability exists in the reference implementation of the built-in mail function...

Journal: :RFC 2006
Jim Lyon Meng Weng Wong

Internet mail suffers from the fact that much unwanted mail is sent using spoofed addresses -"spoofed" in this case means the address is used without the permission of the domain owner. This document describes a family of tests by which SMTP servers can determine whether an e-mail address in a received message was used with the permission of the owner of the domain contained in that e-mail addr...

2015
Hari Priya

Currently, visually challenged people are not able to use computers on their own mainly because keyboards are not user-friendly to them. With advancement in technology, these people find themselves technologically more challenged. This is true especially in the case of social networking, which these people cannot do without external help. Voice-Mail architecture helps blind people to access e-m...

Journal: :The Gerontologist 2001
D B Raziano R Jayadevappa D Valenzula M Weiner R Lavizzo-Mourey

PURPOSE This study compared the response time, response rate, and cost of two types of survey administration techniques: e-mail/web-based versus conventional postal mail. The main aim of the survey was to collect descriptive information on the existence of Acute Care for Elders units and their characteristics by surveying geriatric division chiefs. DESIGN AND METHODS Two randomized cohorts of...

Journal: :Inf. Sci. 2007
Irena Koprinska Josiah Poon James Clark Jason Chan

In this paper we study supervised and semi-supervised classification of e-mails. We consider two tasks: filing e-mails into folders and spam e-mail filtering. Firstly, in a supervised learning setting, we investigate the use of random forest for automatic e-mail filing into folders and spam e-mail filtering. We show that random forest is a good choice for these tasks as it runs fast on large an...

1998
Hao Chen Jianying Hu Richard Sproat

The signature block is a common structured component found in e-mail messages. Accurate identification and analysis of signature blocks are important in many multimedia messaging and information retrieval applications such as email text-to-speech rendering. It is also a very challenging task, because signature blocks often appear in complex twodimensional layouts which are guided only by loose ...

2005
Gabor Cselle Roger Wattenhofer Keno Albrecht

We describe TripletMail, a system for outsourcing e-mail backups. The typical corporate mail server that handles receiving, sending and storing e-mails is replaced by two components: A mail server for SMTP/IMAP and a storage system which maintains several encrypted copies of each e-mail in racks of inexpensive servers. In this thesis, we focus on two problems of the storage system: In inexpensi...

1997
Richard J. Holland

This paper describes a portable electronic mail bouncer which sends detailed information back to the sender when a mail message can not be delivered to it’s intended recipient. The bouncer was originally written to handle a large merger between multiple DNS domains, and is implemented entirely in Perl5 as a mail delivery agent. The bouncer operates under the concept of "least privilege" so it’s...

1998
Bruce Schneier James Riordan

Protocols to facilitate secure electronic delivery are necessary if the Internet is to achieve its true potential as a business communications tool. We present a protocol for secure e-mail that protects both the sender and the receiver, and can be implemented using current e-mail products and existing Internet infrastructure.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید