Author:
Mallesh Nayantara,Wright Matthew
Subject
Law,General Computer Science
Reference23 articles.
1. Androutsopoulos I, Koutsias J, Chandrinos K, Paliouras G, Spyropoulos C. May 2000. An evaluation of naive bayesian anti-spam filtering. In: Proc. Workshop on Machine Learning in the New Information Age.
2. Emergence of scaling in random networks;Barabási;Science,1999
3. Bennett K, Grothoff C, Horozov T, Patrascu I, Stef T. Mar. 2002. Gnunet – a truly anonymous networking infrastructure. In: Proc. Privacy Enhancing Technologies Workshop (PET).
4. Berthold O, Langos H. Apr. 2002. Dummy traffic against long-term intersection attacks. In: Proc. Privacy Enhancing Technologies Workshop (PET).
5. Untraceable electronic mail, return addresses, and digital pseudonyms;Chaum;Communications of the ACM,1981
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献