{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T18:24:22Z","timestamp":1649010262488},"reference-count":22,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Digital Forensic Practice"],"published-print":{"date-parts":[[2009,9,9]]},"DOI":"10.1080\/15567280903140961","type":"journal-article","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T08:05:26Z","timestamp":1252915526000},"page":"209-220","source":"Crossref","is-referenced-by-count":0,"title":["Incorporating Accountability into Internet E-mail"],"prefix":"10.1080","volume":"2","author":[{"given":"Wayne W.","family":"Liu","sequence":"first","affiliation":[]},{"given":"Sudhir","family":"Aggarwal","sequence":"additional","affiliation":[]},{"given":"Zhenhai","family":"Duan","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","unstructured":"Blaze, M., Feigenbaum, J. and Lacy, J. 1996. Decentralized Trust Management. Proceedings of the 1996 IEEE Conference on Privacy and Security. 1996. IEEE Computer Society Press."},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Jung, J. and Sit, E. 2004. An Empirical Study of Spam Traffic and the Use of DNS Black Lists. IMC \u201904: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement. 2004, New York. ACM.","DOI":"10.1145\/1028788.1028838"},{"key":"CIT0003","volume-title":"WPES \u201904: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society","author":"Borisov N.","year":"2004"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1145\/1035134.1035159"},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"Chun, B.N. and Bavier, A. 2004. Decentralized Trust Management and Accountability in Federated Systems. HICSS \u201904: Proceedings of the 37th Annual Hawaii International Conference on System Sciences\u2014Track 9. 2004, Washington, DC. IEEE Computer Society.","DOI":"10.1109\/HICSS.2004.1265656"},{"key":"CIT0007","volume-title":"EW11: Proceedings of the 11th ACM SIGOPS European Workshop","author":"Yumerefendi A.R.","year":"2004"},{"key":"CIT0010","volume-title":"IPTPS \u201901: The First International Workshop on Peer-to-Peer Systems","author":"Douceur J.R.","year":"2002"},{"key":"CIT0011","volume-title":"NSPW \u201997: Proceedings of the 1997 workshop on new security paradigms","author":"Abdul-Rahman A.","year":"1997"},{"key":"CIT0012","author":"Juels A.","year":"1999","journal-title":"Proceedings of NDSS \u201999 (Networks and Distributed Security Systems)."},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067734"},{"key":"CIT0016","volume-title":"SOUPS \u201905: Proceedings of the 2005 Symposium on Usable Privacy and Security","author":"Garfinkel S.L.","year":"2005"},{"key":"CIT0017","unstructured":"Duan, Z., Gopalan, K. and Yuan, X. Behavioral Characteristics of Spammers and Their Network Reachability Properties. ICC \u201907. IEEE International Conference on Communications."},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159947"},{"key":"CIT0019","doi-asserted-by":"crossref","unstructured":"Xie, M., Yin, H. and Wang, H. 2006. An Effective Defense against Email Spam Laundering. CCS \u201906: Proceedings of the 13th ACM Conference on Computer and Communications Security. 2006, New York. ACM.","DOI":"10.1145\/1180405.1180428"},{"key":"CIT0020","volume-title":"Proceedings of ACM SIGCOMM 2007","author":"Xie Y.","year":"2007"},{"key":"CIT0021","volume-title":"LISA\u201907: Proceedings of the 21st Large Installation System Administration Conference","author":"Singaraju G.","year":"2007"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.1997.601070"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1145\/966789.966799"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1126\/science.162.3859.1243"},{"key":"CIT0025","author":"Gray T.","year":"2003","journal-title":"Security at Line Speed Workshop Findings and Report"},{"key":"CIT0026","author":"Adida B.","year":"2005","journal-title":"USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI)"},{"key":"CIT0027","unstructured":"Watson, B. 2004. Beyond Identity: Addressing Problems That Persists in an Electronic Mail System with Reliable Sender Identification. CEAS 2004\u2014First Conference on Email and Anti-Spam. 2004, Mountain View, CA."}],"container-title":["Journal of Digital Forensic Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T11:02:42Z","timestamp":1558522962000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/15567280903140961"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,9]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,9,9]]}},"alternative-id":["10.1080\/15567280903140961"],"URL":"https:\/\/doi.org\/10.1080\/15567280903140961","relation":{},"ISSN":["1556-7281","1556-7346"],"issn-type":[{"value":"1556-7281","type":"print"},{"value":"1556-7346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9,9]]}}}