Author of the publication

A Protection Method Against Massive Error Mails Caused by Sender Spoofed Spam Mails.

, , , , and . SAINT, page 384-390. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

E-Mail Priority Delivery System with Dynamic Whitelist in the Layer 3 Switch., , , , and . COMPSAC Workshops, page 581-586. IEEE Computer Society, (2013)A Solution for Mail Forwarding Problem of SPF by Tracing Recipient Addresses., , , , , and . SAINT, page 129-132. IEEE Computer Society, (2010)An Identification Method of PCs behind NAT Router with Proxy Authentication on HTTP Communication., , , and . SAINT, page 445-450. IEEE Computer Society, (2011)Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination., , , , , and . COMPSAC Workshops, page 587-592. IEEE Computer Society, (2013)An Optimal Route Selection Mechanism for Outbound Connection on IPv6 Site Multihoming Environment., , , , , and . COMPSAC Workshops, page 575-580. IEEE Computer Society, (2013)High-Speed Calculation of Worst-Case Link Delays in the EDD Connection Admission Control Scheme., and . IEICE Trans. Commun., 89-B (7): 2012-2022 (2006)An Efficient Management Method of Access Policies for Hierarchical Virtual Private Networks., , , , and . COMSWARE, IEEE, (2007)A Protection Method Against Massive Error Mails Caused by Sender Spoofed Spam Mails., , , , and . SAINT, page 384-390. IEEE Computer Society, (2005)Node Placement Algorithms in the Case that Routes are Design Variables in Shuffle-Like Multihop Lightwave Networks., and . IEICE Trans. Commun., 88-B (12): 4578-4587 (2005)New Approach for Configuring Hierarchical Virtual Private Networks Using Proxy Gateways., , , , and . ICOIN, volume 2662 of Lecture Notes in Computer Science, page 772-782. Springer, (2003)