This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
November 2005 (vol. 38 no. 11)
pp. 17-19
To counter the explosion of spam and phishing attacks that cost victims time and money, companies are pursuing e-mail authentication, which is designed to determine whether mail has come from a reliable source and is thus legitimate.
Index Terms:
Spam, Phishing, E-mail authentication
Citation:
George Lawton, "E-Mail Authentication Is Here, but Has It Arrived Yet?," Computer, vol. 38, no. 11, pp. 17-19, Nov. 2005, doi:10.1109/MC.2005.377
Usage of this product signifies your acceptance of the Terms of Use.