The Community for Technology Leaders
Green Image
Issue No. 11 - November (2005 vol. 38)
ISSN: 0018-9162
pp: 17-19
To counter the explosion of spam and phishing attacks that cost victims time and money, companies are pursuing e-mail authentication, which is designed to determine whether mail has come from a reliable source and is thus legitimate.
Spam, Phishing, E-mail authentication
George Lawton, "E-Mail Authentication Is Here, but Has It Arrived Yet?", Computer, vol. 38, no. , pp. 17-19, November 2005, doi:10.1109/MC.2005.377
96 ms
(Ver 3.3 (11022016))