Login / Signup
Revocation of Unread E-mail in an Untrusted Network.
Aviel D. Rubin
Dan Boneh
Kevin Fu
Published in:
ACISP (1997)
Keyphrases
</>
email
network structure
peer to peer
network size
network topologies
access control
complex networks
third party
computer networks
network model
network management
distributed network
database
spam filtering
text mining
data mining
data sets