Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,761 papers from all fields of science
Search
Sign In
Create Free Account
Email authentication
Known as:
Authenticated Email
, E-mail authentication
, Email-validation
Email authentication, or validation, is a collection of techniques aimed at equipping messages of the email transport system with verifiable…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Anti-spam techniques
Authentication
Authorization
Bounce address
Expand
Broader (1)
Spamming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Email Authentication for Internationalized Mail
J. Levine
Request for Comments
2019
Corpus ID: 168619377
SPF (RFC7208), DKIM (RFC6376), and DMARC (RFC7489) enable a domain owner to publish e-mail authentication and policy information…
Expand
2012
2012
Fault Detection and Deployment of Security Mechanisms in E-mail Systems
Kulvinder Singh Handa
,
Sanjeev Dhawan
2012
Corpus ID: 15302162
This paper present the realistic flaws and design implementation of security mechanisms in current e-mail services for…
Expand
2010
2010
An improved password-based authenticated email protocol
Jianhong Zhang
,
Hua Chen
International Conference on Information…
2010
Corpus ID: 6969945
Nowadays, email has become the most widely communication way in daily life. Recently, to improve security and efficiency of email…
Expand
2010
2010
An Efficient Identity-Based Authenticated Email Protocol with Perfect Forward Secrecy
Jianhong Zhang
,
Chen Hua
International Forum on Information Technology and…
2010
Corpus ID: 13969787
Nowadays, email has become the most widely communication way in the daily life. By using identity-based encryption scheme, we…
Expand
2008
2008
Design of Fully Deniable Authentication Service for E-mail Applications
L. Harn
,
Jian Ren
IEEE Communications Letters
2008
Corpus ID: 11650647
Secure electronic mail (e-mail), such as PGP and S/MIME, uses digital signature to provide message authentication, which also…
Expand
2008
2008
Tracking Email Reputation for Authenticated Sender Identities
G. Singaraju
,
Jeffrey Moss
,
Brent Byunghoon Kang
International Conference on Email and Anti-Spam
2008
Corpus ID: 8065081
With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders…
Expand
2005
2005
E-mail authentication is here, but has it arrived yet?
G. Lawton
Computer
2005
Corpus ID: 44515632
The explosion in spam and phishing attacks has cost victims time and money. The attacks have also dented public confidence in e…
Expand
2005
2005
Lightweight Signatures for Email
Ben AdidaDavid ChauSusan Hohenberger
,
Ronald L. Rivest
2005
Corpus ID: 12525187
We present the design and prototype implementation of a new public key infrastucture for email authentication. Our approach…
Expand
2005
2005
Lightweight Encryption for Email
B. Adida
,
S. Hohenberger
,
R. Rivest
Workshop on Steps to Reducing Unwanted Traffic on…
2005
Corpus ID: 14490646
Email encryption techniques have been available for more than a decade, yet none has been widely deployed. The problems of key…
Expand
2003
2003
Giving e-mail back to the users: Using digital signatures to solve the spam problem
Trevor Tompkins
,
Dan Handley
First Monday
2003
Corpus ID: 39249116
This paper argues that current legislative and private attempts to stop spam are either ineffective, or involve unacceptable…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE