Issue No.11 - November (2005 vol.38)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2005.377
To counter the explosion of spam and phishing attacks that cost victims time and money, companies are pursuing e-mail authentication, which is designed to determine whether mail has come from a reliable source and is thus legitimate.
Spam, Phishing, E-mail authentication
George Lawton, "E-Mail Authentication Is Here, but Has It Arrived Yet?", Computer, vol.38, no. 11, pp. 17-19, November 2005, doi:10.1109/MC.2005.377