The Community for Technology Leaders
Green Image
Issue No. 11 - November (2005 vol. 38)
ISSN: 0018-9162
pp: 17-19
ABSTRACT
To counter the explosion of spam and phishing attacks that cost victims time and money, companies are pursuing e-mail authentication, which is designed to determine whether mail has come from a reliable source and is thus legitimate.
INDEX TERMS
Spam, Phishing, E-mail authentication
CITATION

G. Lawton, "E-Mail Authentication Is Here, but Has It Arrived Yet?," in Computer, vol. 38, no. , pp. 17-19, 2005.
doi:10.1109/MC.2005.377
93 ms
(Ver 3.3 (11022016))