Preventing PC from Spam Zombies using SPOT and RE-ENCRYPTION Methods
Z. Duan, Y. Dong, and K. Gopalan, “DMTP: Controlling Spam through Message Delivery Differentiation,” Computer Networks, vol. 51, pp. 2616-2630, July 2007.
Z.Duan,Y.Dong, and K.Gopalan, “DMTP: Controlling Spam through Message Delivery Differentiation, “Computer Networks, 2007.
C. J. Kowalski, “The OC and ASN Functions of Some SPRT’s for the Correlation Coefficient,” Technometrics, Vol. 13, No. 4, 1971, pp. 833-840. doi:10.1080/00401706.1971.10488853
G. Gu, J. Zhang, and W. Lee, “BotSniffer: Detecting BotnetCommand and Control Channels in Network Traffic,” Proc. 15thAnn. Network and Distributed System Security Symp. (NDSS ’08),Feb. 2008.
Ping Wang Sherri Sparks Cliff C. Zou , ―An Advanced Hybrid Peer-to-Peer Botnet‖, School of Electrical Engineering and Computer Science University of Central Florida, Orlando, FL
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In Proceedings of the 12th Annual Network and Distributed System Security Symposium, pages 29–44. Internet Society, February 2005.
Diskey, Jay, on behalf of the Association of American Publishers. “ED-2012-OESE-0003 Testing Integrity Response.” February 16, 2012..
M. G. Reed, P. F. Syverson, and D. M. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4):482-494, May 1998.
Jee Hea An, Yevgeniy Dodis, and Tal Rabin. On the security of joint signature and encryption. In EUROCRYPT ’02: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques,pages 83–107, London, UK, 2002. Springer-Verlag.
P. Golle, M. Jakobsson, A. Juels, and P. F. Syverson. Universal Re-encryption for Mixnets. In Proceedings of CT-RSA '04, volume 2964 of LNCS, pages 163.178,2004
Hart, P. E.; Nilsson, N. J.; Raphael, B. (1968)."A Formal Basis for the Heuristic Determination of Minimum Cost Paths". IEEE Transactions on Systems Science and Cybernetics SSC4 4 (2): 100–107
Digital Communications, John Proakis, Massoud Salehi, McGraw-Hill Education, Nov 6, 2007
Popelka , O.; Rukovansky, I. Optimization of Computer Network with Grammatical Evolution. In proceedings of Fifth international conference on soft computing applied in computer and economic environments ICSC 2007, January 26, EPI Kunovice, pp. 201-205, ISBN 80-7314- 108-6.
Giuseppe Ateniese, Kevin Fu, Matthew Green, Sussan Hohenberger. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage, pages 1-3.
Matthew Green, Giuseppe Ateniese , Identity-Based Proxy Re-Encryption, pages 1-6.
Mihir Bellare1, Viet Tung Hoang. Adaptive Witness Encryption and Asymmetric Password-based Cryptography, pages 1-3.
R. Kishore Kumar, G. Poonkuzhali, P. Sudhakar, Member, IAENG. Comparative Study on Email Spam Classifier using Data Mining Techniques.
Wanli Ma, Dat Tran, and Dharmendra Sharma, A Novel Spam Email Detection System Based on Negative Selection.
Roer Dingledine, Nick Mathewson, Steven Murdoch. Tor: The Second-Generation Onion Router.
Landsiedel, O. ; RWTH Aachen Univ., Aachen ; Pimenidis, A. ; Wehrle, K. ; Niedermayer, Heiko, Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks.
B.Raju, A.Jesudoss and D. Saravanan, Detecting A New Cells Based On Attacks Against TOR Network.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.