Learn More
Cryptography is a powerful tool for building secure distributed systems, albeit at substantial computational cost. This is especially true for public key cryptography. Conventional wisdom dictates that cryptography must be done locally in order to be secure. We argue for an approach in which public key cryptographic operations are provided as a network(More)
Reports in fields as diverse as machine learning , cryptography, natural language processing, systems, security, and human computer-interaction, have been published about spam and e-mail. The Conference on E-mail and Anti-Spam was the first to bring together researchers from these varied fields to a single academic conference where they could exchange ideas(More)
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without(More)
  • 1