نتایج جستجو برای: e mail
تعداد نتایج: 1026691 فیلتر نتایج به سال:
This paper describes a graphical user interface that provides intelligent help to the users of an emailing system. The graphical user interface is called Intelligent Mailer (I-Mailer). I-Mailer monitors users while they work; in case a user is believed to have made a mistake, the system intervenes automatically and offers advice. In order to provide individualised help, the system keeps informa...
Current e-mail security systems base their security on the secrecy of the long-term private key. If this private key is ever compromised, an attacker can decrypt any messages— past, present, or future—encrypted with the corresponding public key. The system described in this paper uses short term private-key/public-key key pairs to reduce the magnitude of this vulnerability.
The increasing volume of unsolicited bulk e-mail (also known as spam) has generated a need for reliable antispam filters. Using a classifier based on machine learning techniques to automatically filter out spam email has drawn many researchers attention. In this paper we review some of the most popular machine learning methods (Bayesian classification, k-NN, ANNs, SVMs, Artificial immune system...
In this paper, a practical and secure e-mail system (called “PractiSES”) that performs public key distribution and management in a unique way is proposed. PractiSES is a network of several domains. At the domain level, a designated PractiSES server, which is trusted by all users of that domain, distributes the public keys. If a user needs another user’s public key at a different domain, then in...
The demand for confidential conferences is increasing, for example on Internet and Intranets. This paper deals with aspects of handling confidential multimedia conferences and in particular pursues a method of utilizing E-mail for this
Persistent identification of entities in Personal Information Management (PIM) is necessary to enable stable, long-term references in archives and semantic applications. In the case of e-mails, the standard offers Message-IDs (MID), which are widely deployed. However, stores do not use the MID but rather rely on a path, which is likely to change, to refer to e-mails and thus do not offer a stab...
By submitting this Internet-Draft, I certify that any applicable patent or other IPR claims of which I am aware have been disclosed, or will be disclosed, and any of which I become aware will be disclosed, in accordance with RFC 3668. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute...
This paper investigates the problem of e-mail spam and identifies methods to efficiently minimize the volumes. It is argued that the usefulness of e-mail and its potential for future growth are jeopardized by the rising tide of unwanted e-mail, both SPAM and viruses. This threatens to wipe out the advantages and benefits of e-mail. An important flaw in current e-mail standards (most notably SMT...
Like it or not, unsolicited bulk commercial email (aka “spam”) has become a regular menu item on the Internet information diet. To combat the daily onslaught of spam clogging people’s email inboxes, much work is being done on the development of effective spam control methods, most of which follow the same basic theme of establishing a “front line” of defense at the end-user level. However, deal...
E-mail correspondence between psychiatrists and patients raises numerous legal concerns with respect to the ethics of the doctor-patient relationship. Case law has shown that a doctor-patient relationship may be established in the absence of face-to-face contact. Despite this, a surprisingly high number of physicians respond to unsolicited e-mails, some even going so far as to suggest diagnoses...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید