{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:30:33Z","timestamp":1725489033959},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735465"},{"type":"electronic","value":"9783540735472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73547-2_17","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T14:54:52Z","timestamp":1186844092000},"page":"146-155","source":"Crossref","is-referenced-by-count":3,"title":["Establishing Trust Between Mail Servers to Improve Spam Filtering"],"prefix":"10.1007","author":[{"given":"Jimmy","family":"McGibney","sequence":"first","affiliation":[]},{"given":"Dmitri","family":"Botvich","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Schwartz, A.: SpamAssassin. O\u2019Reilly (2004)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Goodman, J., Rounthwaite, R.: Stopping outgoing spam. In: Proc. ACM Conference on E-Commerce, New York (2004)","DOI":"10.1145\/988772.988779"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/978-3-540-40965-6_6","volume-title":"Advances in Computing Science \u2013 ASIAN 2003. Progamming Languages and Distributed Computation Programming Languages and Distributed Computation","author":"M. Abadi","year":"2003","unstructured":"Abadi, M., Birrell, A., Burrows, M., Dabek, F., Wobber, T.: Bankable postage for network services. In: Saraswat, V.A. (ed.) ASIAN 2003. LNCS, vol.\u00a02896, pp. 72\u201390. Springer, Heidelberg (2003)"},{"key":"17_CR4","unstructured":"Naor, M.: Verification of a human in the loop or identification via the Turing test. Unpublished manuscript (1996), \n                    \n                      http:\/\/w.wisdom.weizmann.ac.il\/~naor"},{"issue":"8","key":"17_CR5","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MC.2006.257","volume":"39","author":"J. Kong","year":"2006","unstructured":"Kong, J., Rezaei, B., Sarshar, N., Roychowdhury, V., Oscar Boykin, P.: Collaborative spam filtering using e-mail networks. IEEE Computer\u00a039(8), 67\u201373 (2006)","journal-title":"IEEE Computer"},{"key":"17_CR6","unstructured":"Golbeck, J., Hendler, J.: Reputation network analysis for email filtering. In: Proc. Conf. on Email and Anti-Spam (2004)"},{"key":"17_CR7","unstructured":"Neustaedter, C., Bernheim Brush, A., Smith, M., Fisher, D.: The social network and relationship finder: social sorting for email triage. In: Proc. Conf. on Email and Anti-Spam (2005)"},{"key":"17_CR8","unstructured":"Han, S., Ahn, Y., Moon, S., Jeong, H.: Collaborative blog spam filtering using adaptive percolation search. In: Proc. International World Wide Web Conference. Edinburgh (2006)"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/11755593_7","volume-title":"Trust Management","author":"N. Foukia","year":"2006","unstructured":"Foukia, N., Zhou, L., Neuman, C.: Multilateral decisions for collaborative defense against unsolicited bulk e-mail. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol.\u00a03986, pp. 77\u201392. Springer, Heidelberg (2006)"},{"key":"17_CR10","unstructured":"Androutsopoulos, I., Magirou, E., Vassilakis, O.: A game theoretic model of spam e-mailing. In: Proc. Conf. on Email and Anti-Spam, Stanford (2005)"},{"key":"17_CR11","first-page":"213","volume-title":"Trust: making and breaking cooperative relations","author":"D. Gambetta","year":"1988","unstructured":"Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust: making and breaking cooperative relations, pp. 213\u2013237. Blackwell, Oxford (1988)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"McGibney, J., Botvich, D.: A trust overlay architecture and protocol for enhanced protection against spam. In: Proc. Conf. on Availability, Reliability & Security, Vienna, pp. 749\u2013756 (2007)","DOI":"10.1109\/ARES.2007.28"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Douceur, J.: The Sybil attack. In: Proc. International Workshop on P2P Systems (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Klimt, B., Yang, Y.: The Enron corpus: a new dataset for email classification research. In: Proc. European Conf. on Machine Learning, pp. 217\u2013226 (2004)","DOI":"10.1007\/978-3-540-30115-8_22"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73547-2_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:15:49Z","timestamp":1605762949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73547-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735465","9783540735472"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73547-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}