Controlling spam by secure Internet content selection

6Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an efficient cryptographic mechanism for spam-control, based on allocation of responsibility (liability). With SICS, e-mail is sent with a content label, and a cryptographic protocol ensures labels are authentic and penalizes falsely labeled e-mail (spam). The protocol supports trusted senders (penalized by loss of trust) and unknown senders (penalized financially). The recipient can determine the compensation amount for falsely labeled e-mail (spam). SICS is practical, with negligible overhead, gradual adoption path, and use of existing relationships; it is also flexible and appropriate for most scenarios, including deployment by end users and/or ISPs and support for privacy (including encrypted e-mail) and legitimate, properly labeled commercial e-mail. SICS improves on other crypto-based proposals for spam controls, and complements non-cryptographic spam controls. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Herzberg, A. (2005). Controlling spam by secure Internet content selection. In Lecture Notes in Computer Science (Vol. 3352, pp. 337–350). Springer Verlag. https://doi.org/10.1007/978-3-540-30598-9_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free