Academic literature on the topic 'E-mail address'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'E-mail address.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "E-mail address"
Utz, Sonja. "Enter Your E-mail Address: How German Internet Users Manage their E-mail Addresses." CyberPsychology & Behavior 7, no. 2 (2004): 241–46. http://dx.doi.org/10.1089/109493104323024492.
Full textHill, Karen. "Register your e-mail address." Nursing in Critical Care 16, no. 1 (2011): 47. http://dx.doi.org/10.1111/j.1478-5153.2010.00441_7.x.
Full textHill, Karen. "Register your e-mail address." Nursing in Critical Care 17, no. 2 (2012): 106. http://dx.doi.org/10.1111/j.1478-5153.2012.00493_2.x.
Full textThomas, Brendan. "E-mail Address Harvesting on PubMed—A Call for Responsible Handling of E-mail Addresses." Mayo Clinic Proceedings 86, no. 4 (2011): 362. http://dx.doi.org/10.4065/mcp.2010.0817.
Full textHorn, David J. "Change in Editorial E-Mail Address." Entomological News 127, no. 2 (2017): 184. http://dx.doi.org/10.3157/021.127.0201.
Full textHan, Dongyun, and Kyongsok Kim. "A Design and Implementation of SMTPUTF8 Mail Server to Support EAI(E-Mail Address Internationalization) bis Standard." Journal of the Korea society of IT services 12, no. 2 (2013): 321–34. http://dx.doi.org/10.9716/kits.2013.12.2.321.
Full textJIA, Yong-xin, and Ai-mei XIAO. "New method for identifying behavior patterns of worm E-mail based on dummy E-mail address." Journal of Computer Applications 29, no. 8 (2009): 2236–39. http://dx.doi.org/10.3724/sp.j.1087.2009.02236.
Full textDeAngelo, Tessa I., and Bo Feng. "From Inbox Reception to Compliance: A Field Experiment Examining the Effects of E-mail Address and Subject Line on Response and Compliance Rates in Initial E-mail Encounters." Social Science Computer Review 38, no. 6 (2019): 766–78. http://dx.doi.org/10.1177/0894439319839924.
Full textHemalatha, M., Sriharsha Katta, R. Sai Santosh, and Priyanka Priyanka. "E-MAIL SPAM DETECTION." International Journal of Computer Science and Mobile Computing 11, no. 1 (2022): 36–44. http://dx.doi.org/10.47760/ijcsmc.2022.v11i01.006.
Full textRiadi, Imam, Sunardi Sunardi, and Fitriyani Tella Fitri. "Spamming Forensic Analysis Using Network Forensics Development Life Cycle Method." INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi 6, no. 1 (2022): 108–17. http://dx.doi.org/10.29407/intensif.v6i1.16830.
Full textDissertations / Theses on the topic "E-mail address"
Moraes, Juliana Granço Marcelino de. "O tratamento na interação: formas e fórmulas usadas no estabelecimento e encerramento de contato em e-mails de lingua alemã e de língua portuguesa." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/8/8144/tde-14022013-104046/.
Full textScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textΔελέγκου, Βασιλική. "Ανάλυση πρωτοκόλλων σε επίπεδο εφαρμογής σε δίκτυα τηλεϊατρικής". Thesis, 2011. http://hdl.handle.net/10889/4956.
Full textTladi, Sebolawe Erna Mokowadi. "The regulation of unsolicited electronic communications (SPAM) in South Africa : a comparative study." Thesis, 2017. http://hdl.handle.net/10500/25265.
Full textBooks on the topic "E-mail address"
Address Book: To Keep the Address, Phone Number, e-Mail Address, Organizer. Independently Published, 2021.
Find full textMikkonen/, John. WebShark : The Ultimate Website & E-Mail Address Book. M&H Press, Inc., 1997.
Find full textZellers-Rainey, Diane. The Best Little E-Mail Address & Password Organizer. MLB Printing, 2008.
Find full textAddress Book: Use to Keep the Address, Phone Number, e-Mail Address, Organizer Notes. Independently Published, 2021.
Find full textGodin, Seth. E-Mail Address Rich Fam Countrpk 13W/1 Free. Pearson Education, Limited, 1995.
Find full textJoly, Victoria. Address Book: Address / Telephone / E-mail / Birthday / Web address / Log in / Password / Space Collection 5. CreateSpace Independent Publishing Platform, 2016.
Find full textJoly, Victoria. Address Book: Address / Telephone / E-mail / Birthday / Web address / Log in / Password / Music Collection 1. Createspace Independent Publishing Platform, 2016.
Find full textJoly, Victoria. Address Book: Address / Telephone / E-mail / Birthday / Web address / Log in / Password / Mysteries Collection 5. Createspace Independent Publishing Platform, 2017.
Find full textpo. Address Book: Art Style Design [ Keep Organised Name, Address, Phone, Fax , E-Mail ]. Independently Published, 2019.
Find full textpo. Address Book: Art Style Design [ Keep Organised Name, Address, Phone, Fax , E-Mail ]. Independently Published, 2019.
Find full textBook chapters on the topic "E-mail address"
Asscher, Lodewijk F., and Sjo Anne Hoogcarspel. "Harvesting E-Mail Addresses." In Information Technology and Law Series. T.M.C. Asser Press, 2006. http://dx.doi.org/10.1007/978-90-6704-711-1_4.
Full textBell, Mary Ann, Bobby Ezell, and James L. Van Roekel. "E-Mail Addresses and Privacy." In Cybersins and Digital Good Deeds. CRC Press, 2024. http://dx.doi.org/10.1201/9781003573302-31.
Full textTellenbach, Bernhard. "Identity-Based Cryptography." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_12.
Full textAchugbue, Edwin I. "Electronic Mail Security." In Handbook of Research on Information Communication Technology Policy. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-847-0.ch010.
Full textVeluru, Suresh, Yogachandran Rahulamathavan, B. B. Gupta, and Muttukrishnan Rajarajan. "Privacy Preserving Text Analytics." In Handbook of Research on Securing Cloud-Based Databases with Biometric Applications. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6559-0.ch017.
Full textVeluru, Suresh, Yogachandran Rahulamathavan, B. B. Gupta, and Muttukrishnan Rajarajan. "Privacy Preserving Text Analytics." In Standards and Standardization. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8111-8.ch066.
Full textAl-Hamdani, Wasim A. "Cryptography in E-Mail and Web Services." In Applied Cryptography for Cyber Security and Defense. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch004.
Full textPournelle, Jerry. "The Ten Worst E-mail Mistakes." In 1001 Computer Words You Need to Know. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195167757.003.0010.
Full textPournelle, Jerry. "Dealing with Spam." In 1001 Computer Words You Need to Know. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195167757.003.0012.
Full textPavan, Elisabetta. "Politeness, Intercultural Communication, E-Mails." In Intercultural Foreign Language Teaching and Learning in Higher Education Contexts. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8128-4.ch003.
Full textConference papers on the topic "E-mail address"
Avramescu, Elena Taina, Mariya Hristova Monova-Zheleva, Arslan Say, and Irina Ghiata. "DEVELOPMENT OF NEW SKILLS FOR MEDICAL STUDENTS IN PANDEMIC CONTEXT." In 11th SWS International Scientific Conferences on SOCIAL SCIENCES - ISCSS 2024. SGEM WORLD SCIENCE, 2024. https://doi.org/10.35603/sws.iscss.2024/s08/52.
Full textBanday, M. Tariq, and Shafiya Afzal Sheikh. "Multiple E-mail address certificate." In 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2013. http://dx.doi.org/10.1109/icacci.2013.6637337.
Full textMashwani, Syed Rahman, Shah Khusro, and A. Min Tjoa. "E-Mail Address Privacy via PEA's (Proxy E-Mails Accounts)." In 2009 Second International Symposium on Electronic Commerce and Security. IEEE, 2009. http://dx.doi.org/10.1109/isecs.2009.257.
Full textGupta, Surekha, Emmanuel S. Pilli, Preeti Mishra, Sumit Pundir, and R. C. Joshi. "Forensic analysis of E-mail address spoofing." In 2014 5th International Conference- Confluence The Next Generation Information Technology Summit. IEEE, 2014. http://dx.doi.org/10.1109/confluence.2014.6949302.
Full textJoffily, M., M. S. Miranda, A. Nigri, and A. F. S. Santoro. "MAILBOOK: An E-mail Address Handling Tool." In Proceedings of the International Conference. WORLD SCIENTIFIC, 1996. http://dx.doi.org/10.1142/9789814447188_0108.
Full textVeluru, Suresh, Yogachandran Rahulamathavan, P. Viswanath, Paul Longley, and Muttukrishnan Rajarajan. "E-mail address categorization based on semantics of surnames." In 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM). IEEE, 2013. http://dx.doi.org/10.1109/cidm.2013.6597240.
Full textBanday, M. Tariq, and Shafiya Afzal Sheikh. "S/MIME with multiple e-mail address certificates: A usability study." In 2014 International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2014. http://dx.doi.org/10.1109/ic3i.2014.7019789.
Full textJin, Lei, Hassan Takabi, and James B. D. Joshi. "Security and Privacy Risks of Using E-mail Address as an Identity." In 2010 IEEE Second International Conference on Social Computing (SocialCom). IEEE, 2010. http://dx.doi.org/10.1109/socialcom.2010.134.
Full textBenesch, Thomas. "Is Their Craze on the Internet?" In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2372.
Full textCarvalho, Junia Costa, Natália Tomaz Pires, Silvana Soares dos Santos, et al. "CONDUCTING BREAST CANCER RESEARCH DURING A PANDEMIC ISOLATION TIME." In Brazilian Breast Cancer Symposium 2022. Mastology, 2022. http://dx.doi.org/10.29289/259453942022v32s2063.
Full textReports on the topic "E-mail address"
Lyon, J. Purported Responsible Address in E-Mail Messages. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4407.
Full textAllocchio, C. GSTN Address Element Extensions in E-mail Services. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2846.
Full textJeff Huang, Jeff Huang. How do spammers harvest your e-mail address? Experiment, 2012. http://dx.doi.org/10.18258/0009.
Full textSkow, Jason, and Smitha Koduru. PR-244-163728-R01 In-Line Inspection Crack Tool Performance Evaluation Phase II. Pipeline Research Council International, Inc. (PRCI), 2018. http://dx.doi.org/10.55274/r0011531.
Full textBriones, Roehlano. Market and State in Philippine Agricultural Policy. Philippine Institute for Development Studies, 2022. https://doi.org/10.62986/dp2022.08.
Full textCortiñas-Rovira, S., and B. Salvador-Mata. Pseudociencia y sociedad en España. Sociedad Latina de Comunicación Social, 2022. http://dx.doi.org/10.4185/cac179.
Full textJones, Emily, Beatriz Kira, Anna Sands, and Danilo B. Garrido Alves. The UK and Digital Trade: Which way forward? Blavatnik School of Government, 2021. http://dx.doi.org/10.35489/bsg-wp-2021/038.
Full textAtuesta, Laura, Agustina Schijman, Salvatore Schiavo-Campo, and Monika Huppi. IDB-9: Country Systems. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010516.
Full textD’Agostino, Martin, Nigel Cook, Liam O’Connor, et al. Optimising extraction and RT-qPCR-based detection of hepatitis E virus (HEV) from pork meat and products. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.ylv958.
Full textBrophy, Kenny, and Alison Sheridan, eds. Neolithic Scotland: ScARF Panel Report. Society of Antiquaries of Scotland, 2012. http://dx.doi.org/10.9750/scarf.06.2012.196.
Full text