Issue No. 11 - November (2005 vol. 38)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2005.377
To counter the explosion of spam and phishing attacks that cost victims time and money, companies are pursuing e-mail authentication, which is designed to determine whether mail has come from a reliable source and is thus legitimate.
Spam, Phishing, E-mail authentication
G. Lawton, "E-Mail Authentication Is Here, but Has It Arrived Yet?," in Computer, vol. 38, no. , pp. 17-19, 2005.