skip to main content
RFC0821: Simple Mail Transfer Protocol1982 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 August 1982
Bibliometrics
Abstract

No abstract available.

RFC Downloads

Cited By

  1. Bringmann K, Keusch R, Lengler J, Maus Y and Molla A (2022). Greedy routing and the algorithmic small-world phenomenon, Journal of Computer and System Sciences, 125:C, (59-105), Online publication date: 1-May-2022.
  2. ACM
    Liu E, Akiwate G, Jonker M, Mirian A, Savage S and Voelker G Who's got your mail? Proceedings of the 21st ACM Internet Measurement Conference, (122-136)
  3. Müller J, Brinkmann M, Poddebniak D, Böck H, Schinzel S, Somorovsky J and Schwenk J "Johnny, you are fired!" - spoofing openPGP and S/MIME signatures in emails Proceedings of the 28th USENIX Conference on Security Symposium, (1011-1028)
  4. Zhao S and Liu S An Add-on End-to-end Secure Email Solution in Mobile Communications Proceedings of the 10th EAI International Conference on Mobile Multimedia Communications, (57-61)
  5. ACM
    Bates A and Kalita J Counting Clusters in Twitter Posts Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-9)
  6. ACM
    Durumeric Z, Adrian D, Mirian A, Kasten J, Bursztein E, Lidzborski N, Thomas K, Eranti V, Bailey M and Halderman J Neither Snow Nor Rain Nor MITM... Proceedings of the 2015 Internet Measurement Conference, (27-39)
  7. Voras I, Orlić M and Žagar M Something old is new again Proceedings of the 12th IFIP WG 6.1 international conference on Distributed Applications and Interoperable Systems, (202-207)
  8. ACM
    Kreibich C, Weaver N, Kanich C, Cui W and Paxson V GQ Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, (397-412)
  9. ACM
    Pujara J, Daumé H and Getoor L Using classifier cascades for scalable e-mail classification Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, (55-63)
  10. ACM
    Arlitt M, Carlsson N, Gill P, Mahanti A and Williamson C (2011). Characterizing Intelligence Gathering and Control on an Edge Network, ACM Transactions on Internet Technology, 11:1, (1-26), Online publication date: 1-Jul-2011.
  11. Chrobok N, Trotman A and O'Keefe R Advantages and vulnerabilities of pull-based email-delivery Proceedings of the Eighth Australasian Conference on Information Security - Volume 105, (22-31)
  12. Ren Q, Mu Y and Susilo W Mitigating phishing with ID-based online/offline authentication Proceedings of the sixth Australasian conference on Information security - Volume 81, (59-64)
  13. ACM
    Gansterer W and Ilger M Analyzing UCE/UBE traffic Proceedings of the ninth international conference on Electronic commerce, (195-204)
  14. Crespo R, Carvalho M and Logrippo L (2007). Distributed resolution of feature interactions for internet applications, Computer Networks: The International Journal of Computer and Telecommunications Networking, 51:2, (382-397), Online publication date: 1-Feb-2007.
  15. Ma W, Tran D and Sharma D Detecting image based spam email Proceedings of the 1st international conference on Advances in hybrid information technology, (168-177)
  16. ACM
    Rubin S, Jha S and Miller B Protomatching network traffic for high throughputnetwork intrusion detection Proceedings of the 13th ACM conference on Computer and communications security, (47-58)
  17. Luo H, Fang B and Yun X A counting-based method for massive spam mail classification Proceedings of the Second international conference on Information Security Practice and Experience, (45-56)
  18. Bhargavan K and Gunter C (2018). Network Event Recognition, Formal Methods in System Design, 27:3, (213-251), Online publication date: 1-Nov-2005.
  19. ACM
    Afergan M and Beverly R (2005). The state of the email address, ACM SIGCOMM Computer Communication Review, 35:1, (29-36), Online publication date: 1-Jan-2005.
  20. ACM
    Danezis G and Laurie B Minx Proceedings of the 2004 ACM workshop on Privacy in the electronic society, (59-65)
  21. Jones J, Orso A and Harrold M (2004). GAMMATELLA, Information Visualization, 3:3, (173-188), Online publication date: 1-Sep-2004.
  22. ACM
    Orso A, Jones J and Harrold M Visualization of program-execution data for deployed software Proceedings of the 2003 ACM symposium on Software visualization, (67-ff)
  23. ACM
    Hess A and Seamons K An access control model for dynamic client-side content Proceedings of the eighth ACM symposium on Access control models and technologies, (207-216)
  24. Charzinski J (2019). Observed performance of elastic Internet applications, Computer Communications, 26:8, (914-925), Online publication date: 1-May-2003.
  25. Regan J and Jensen C Capability file names Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
  26. ACM
    Paxson V (2019). An analysis of using reflectors for distributed denial-of-service attacks, ACM SIGCOMM Computer Communication Review, 31:3, (38-47), Online publication date: 1-Jul-2001.
  27. Eckert C and Pircher A Internet anonymity Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (35-50)
  28. ACM
    Mogul J and Minshall G (2019). Rethinking the TCP Nagle algorithm, ACM SIGCOMM Computer Communication Review, 31:1, (6-20), Online publication date: 1-Jan-2001.
  29. Curtin M Shibboleth Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (20-20)
  30. Zhang Y and Paxson V Detecting backdoors Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (12-12)
  31. ACM
    Brown I and Hosein G Serve yourself Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions, (39-41)
  32. ACM
    Armstrong J Increasing the realibility of email services Proceedings of the 2000 ACM symposium on Applied computing - Volume 2, (627-632)
  33. ACM
    Ghini V, Pau G and Salomoni P Integrating notification services in computer network and mobile telephony Proceedings of the 2000 ACM symposium on Applied computing - Volume 2, (549-553)
  34. ACM
    Leijen D and Meijer E (2019). Domain specific embedded compilers, ACM SIGPLAN Notices, 35:1, (109-122), Online publication date: 1-Jan-2000.
  35. ACM
    Leijen D and Meijer E Domain specific embedded compilers Proceedings of the 2nd conference on Domain-specific languages, (109-122)
  36. ACM
    Saito Y, Bershad B and Levy H (1999). Manageability, availability and performance in Porcupine, ACM SIGOPS Operating Systems Review, 33:5, (1-15), Online publication date: 12-Dec-1999.
  37. ACM
    Saito Y, Bershad B and Levy H Manageability, availability and performance in Porcupine Proceedings of the seventeenth ACM symposium on Operating systems principles, (1-15)
  38. Beck R Dealing with Public Ethernet Jacks - Switches, Gateways, and Authentication Proceedings of the 13th USENIX conference on System administration, (149-154)
  39. Leijen D and Meijer E Domain specific embedded compilers Proceedings of the 2nd conference on Conference on Domain-Specific Languages - Volume 2, (9-9)
  40. Zenel B (1999). A general purpose proxy filtering mechanism applied to the mobile environment, Wireless Networks, 5:5, (391-409), Online publication date: 1-Oct-1999.
  41. Whitehead E and Goland Y WebDAV Proceedings of the sixth conference on European Conference on Computer Supported Cooperative Work, (291-310)
  42. ACM
    Berchtold S, Biliris A and Panagos E (2019). SaveMe, ACM SIGSOFT Software Engineering Notes, 24:2, (167-176), Online publication date: 1-Mar-1999.
  43. ACM
    Berchtold S, Biliris A and Panagos E SaveMe Proceedings of the international joint conference on Work activities coordination and collaboration, (167-176)
  44. ACM
    Steppler M Performance analysis of communication systems formally specified in SDL Proceedings of the 1st international workshop on Software and performance, (49-62)
  45. Hess C, Lin D and Nahrstedt K (2019). VistaMail, IEEE MultiMedia, 5:4, (13-23), Online publication date: 1-Oct-1998.
  46. ACM
    Crawford G (1998). A simple SMTP framework for Java, XRDS: Crossroads, The ACM Magazine for Students, 4:4, (24-28), Online publication date: 1-May-1998.
  47. ACM
    Hall R (1998). How to avoid unwanted email, Communications of the ACM, 41:3, (88-95), Online publication date: 1-Mar-1998.
  48. Kervella B and Gay V (1997). MHEGAM—A Multimedia Messaging System, IEEE MultiMedia, 4:4, (22-29), Online publication date: 1-Oct-1997.
  49. ACM
    Zenel B and Duchamp D A general purpose proxy filtering mechanism applied to the mobile environment Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, (248-259)
  50. Patel A and Gaffney K (2019). A technique for multi-network access to multimedia messages, Computer Communications, 20:5, (324-337), Online publication date: 1-Jul-1997.
  51. Dokko S, Yun S and Kim T Development of Multimedia E-mail System Providing an Integrated Message View Proceedings of the High-Performance Computing on the Information Superhighway, HPC-Asia '97
  52. Lee H, Yoon S and Kim T Integrated Multimedia E-mail Handler with Authoring Tool Proceedings of the High-Performance Computing on the Information Superhighway, HPC-Asia '97
  53. ACM
    Wiegel B Secure external references in multimedia email messages Proceedings of the 3rd ACM conference on Computer and communications security, (11-18)
  54. ACM
    Joseph A, de Lespinasse A, Tauber J, Gifford D and Kaashoek M (1995). Rover, ACM SIGOPS Operating Systems Review, 29:5, (156-171), Online publication date: 3-Dec-1995.
  55. ACM
    Joseph A, de Lespinasse A, Tauber J, Gifford D and Kaashoek M Rover Proceedings of the fifteenth ACM symposium on Operating systems principles, (156-171)
  56. ACM
    Au S Hello, world! a guide for transmitting multilingual electronic mail Proceedings of the 23rd annual ACM SIGUCCS conference on User services: winning the networking game, (35-39)
  57. ACM
    Lenssen K Enabling hypermedia messaging Proceedings of the second ACM international conference on Multimedia, (157-163)
  58. ACM
    Kent S (1993). Internet Privacy Enhanced Mail, Communications of the ACM, 36:8, (48-60), Online publication date: 1-Aug-1993.
  59. ACM
    Lehman R Some issues in providing campus-wide electronic mail Proceedings of the 17th annual ACM SIGUCCS conference on User Services, (115-122)
  60. ACM
    Bishop M UNIX security in a supercomputing environment Proceedings of the 1989 ACM/IEEE conference on Supercomputing, (693-698)
  61. ACM
    Rochlis J and Eichin M (1989). With microscope and tweezers: the worm from MIT's perspective, Communications of the ACM, 32:6, (689-698), Online publication date: 1-Jun-1989.
  62. ACM
    Spafford E (1989). Crisis and aftermath, Communications of the ACM, 32:6, (678-687), Online publication date: 1-Jun-1989.
  63. ACM
    Spafford E (1989). The internet worm program: an analysis, ACM SIGCOMM Computer Communication Review, 19:1, (17-57), Online publication date: 3-Jan-1989.
  64. ACM
    Saito K (1987). The Sigma network, ACM SIGCOMM Computer Communication Review, 17:5, (88-97), Online publication date: 1-Oct-1987.
  65. ACM
    Arnold G (1987). Internet protocol implementation experiences in PC-NFS, ACM SIGCOMM Computer Communication Review, 17:5, (8-14), Online publication date: 1-Oct-1987.
  66. ACM
    Saito K The Sigma network Proceedings of the ACM workshop on Frontiers in computer communications technology, (88-97)
  67. ACM
    Arnold G Internet protocol implementation experiences in PC-NFS Proceedings of the ACM workshop on Frontiers in computer communications technology, (8-14)
  68. ACM
    Kille S and Brink D (1985). A model of message flow control, ACM SIGCOMM Computer Communication Review, 15:5, (40-49), Online publication date: 1-Oct-1985.
  69. ACM
    Comer D and Peterson L Issues in using DARPA domain names for computer mail Proceedings of the ninth symposium on Data communications, (158-164)
  70. ACM
    Comer D and Peterson L (1985). Issues in using DARPA domain names for computer mail, ACM SIGCOMM Computer Communication Review, 15:4, (158-164), Online publication date: 1-Sep-1985.
Contributors

Recommendations