{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:00:16Z","timestamp":1740096016476,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540720348"},{"type":"electronic","value":"9783540720355"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72035-5_47","type":"book-chapter","created":{"date-parts":[[2007,6,5]],"date-time":"2007-06-05T16:02:15Z","timestamp":1181059335000},"page":"598-609","source":"Crossref","is-referenced-by-count":1,"title":["A Trustworthy Email System Based on Instant Messaging"],"prefix":"10.1007","author":[{"given":"Wenmao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jun","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","unstructured":"Claburn, T.: Big guns aim at spam. Information Week (2004)"},{"key":"47_CR2","unstructured":"Carrreras, X., Marquez, L.: Boosting trees for anti-spam email filtering. In: Proceedings of RANLP-01, 4th International Conference on Recent Advances in Natural Language Processing, Tzigov Chark, BG (2001)"},{"key":"47_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/280324.280336","volume":"41","author":"L. Cranor","year":"1998","unstructured":"Cranor, L., Lamacchia, B.: Spam! Communications of the ACM\u00a041, 74\u201383 (1998)","journal-title":"Communications of the ACM"},{"key":"47_CR4","unstructured":"Graham, P.: Better Bayesian filtering (2003), http:\/\/www.paulgraham.com\/better.html"},{"key":"47_CR5","unstructured":"Golbeck, J., Hendler, J.: Reputation Network Analysis for Email Filtering. In: Proc. of the Conference on Email and Anti-Spam (CEAS), Mountain View, CA, USA (2004)"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proc. of the 12th Intl. WWW Conference (2003)","DOI":"10.1145\/775152.775242"},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Chirita, P.A., Diederich, J., Nejdl, W.: MailRank: Using Ranking for Spam Detection. In: CIKM\u201905, Bremen, Germany (2005)","DOI":"10.1145\/1099554.1099671"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Saint-Andre, P.: Extensible Messaging and Presence Protocol (XMPP): Core. In: RFC 3920 (2004)","DOI":"10.17487\/rfc3920"},{"key":"47_CR9","unstructured":"Devrieze, S.: http:\/\/users.telenet.be\/s.devrieze\/imail\/imail.pdf"},{"key":"47_CR10","unstructured":"Pollard, J.B.: http:\/\/homepages.tesco.net\/J.deBoynePollard\/Proposals\/IM2000\/"},{"key":"47_CR11","unstructured":"Saint-Andre, P.: http:\/\/www.jabber.org\/jeps\/jep-0030.html"},{"key":"47_CR12","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems (2005), http:\/\/dx.doi.org\/10.1016\/j.dss.2005.05.019","DOI":"10.1016\/j.dss.2005.05.019"}],"container-title":["Lecture Notes in Computer Science","Business Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72035-5_47.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:28:32Z","timestamp":1605763712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72035-5_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540720348","9783540720355"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72035-5_47","relation":{},"subject":[]}}