Check out the new USENIX Web site.
: Push vs. Pull: Implications : Summary

References

1
CLABURN, T.
Big guns aim at spam.
Information Week (Mar. 2004).

2
DELANY, M.
Domain-based email authentication using public-keys avertised in the DNS (domainkeys).
Internet Draft (Aug. 2004).
[draft-delany-domainkeys-base-01.txt].

3
DUAN, Z., DONG, Y., AND GOPALAN, K.
DiffMail: A differentiated message delivery architecture to control spam.
Tech. Rep. TR-041025, Department of Computer Science, Florida State University (Oct. 2004).

4
DUAN, Z., GOPALAN, K., AND DONG, Y.
Receiver-driven extensions to SMTP.
Internet Draft (May 2005).
[draft-duan-smtp-receiver-driven-00.txt].

5
FU, K.
Personal communication.
MIT, (Mar. 2005).

6
GOMES, L., CAZITA, C., ALMEIDA, J., ALMEIDA, V., AND MEIRA, W.
Charactering a spam traffic.
In Proceedings of IMC'04 (Oct. 2004).

7
GRAHAM, P.
A plan for spam.

http://www.paulgraham.com/spam.html (2003).

8
JUELS, A., AND BRAINARD, J.
Client puzzles: A cryptographic defense against connection depletion attacks.
In Proceedings of NDSS-1999 (Networks and Distributed Security Systems) (Feb. 1999).

9
KLENSIN, J.
Simple mail transfer protocol.
RFC 2821 (Apr. 2001).

10
LAURIE, B., AND CLAYTON, R.
"Proof-of-Work" proves not to work.
http://www.apache-ssl.org/proofwork.pdf (May 2004).

11
LYON, J., AND WONG, M.
Sender ID: Authenticating e-mail.
Internet Draft (Aug. 2004).
[draft-ietf-marid-core-03.txt].

12
RBL.
Real-time spam black lists (RBL).
http://www.email-policy.com/Spam-black-lists.htm.

13
RISHI, V.
Free lunch ends: e-mail to go paid.
The Economic Times (Feb. 2004).

14
SANDVINE INCORPORATED.
Trend analysis: Spam trojans and their impact on broadband service providers (June 2004).

15
THE WASHINGTON POST.
FCC sets sights on mobile phone spam (Mar. 2004).

16
BERNSTEIN, D.
Internet Mail 2000 (IM2000).

http://cr.yp.to/im2000.html.