Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Anti Spamming Techniques
Post: #1

ABSTRACT
A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. It has been suggested that such abuse may be discouraged by introducing an artificial cost in the form of a moderately expensive computation. Thus, the sender of an e-mail might be required to pay by computing for a few seconds before the e-mail is accepted. Unfortunately, because of sharp disparities across computer systems, this approach may be ineffective against malicious users with high-end systems, prohibitively slow for legitimate users with low-end systems, or both. Starting from this observation, some moderately hard functions that most recent systems will evaluate at about the same speed are discussed. For this purpose, we rely on memory-bound computations. A family of moderately hard, memory-bound functions and Ticket servers, are described and we explain how to use them for protecting against abuses.
[attachment=314]
 

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 4,812 15-04-2016 08:04 PM
Last Post: knagpur
  Image Processing & Compression Techniques (Download Full Seminar Report) Computer Science Clay 42 19,817 07-10-2014 07:57 PM
Last Post: seminar report asees
Brick Face Recognition using the Techniques Base on Principal Component Analysis (PCA) computer science crazy 3 2,955 04-03-2013 01:21 PM
Last Post: Guest
  computer virus and anti virus full report computer science technology 12 11,775 28-01-2013 03:28 PM
Last Post: seminar details
  Eye Movement-Based Human-Computer Interaction Techniques computer girl 1 3,259 17-10-2012 01:24 PM
Last Post: Guest
  VWS: Applying virtualization techniques to Web Services computer girl 0 581 09-06-2012 11:38 AM
Last Post: computer girl
  A Review of Data Compression Techniques seminar surveyer 1 1,233 01-03-2012 11:42 AM
Last Post: seminar paper
  PACKET SNIFFING WITH ANTI STUFF seminar projects crazy 1 1,936 10-02-2012 09:50 AM
Last Post: seminar addict
  Design Techniques for Voice Browsers Electrical Fan 1 2,382 21-01-2012 09:50 AM
Last Post: seminar addict
  Secured Data Transmission using Cryptographic and Steganographic Techniques Electrical Fan 2 2,472 14-09-2011 10:17 AM
Last Post: seminar addict