Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Email authentication

Known as: Authenticated Email, E-mail authentication, Email-validation 
Email authentication, or validation, is a collection of techniques aimed at equipping messages of the email transport system with verifiable… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Business email compromise scams (also known as ‘CEO fraud’) have cost companies $3.1bn in the past two years alone, according to… Expand
Highly Cited
2014
Highly Cited
2014
Email plays an important role in the digital economy but is threatened by increasingly sophisticated cybercrimes. A number of… Expand
2010
2010
Nowadays, email has become the most widely communication way in the daily life. By using identity-based encryption scheme, we… Expand
2008
2008
  • L. Harn, J. Ren
  • IEEE Communications Letters
  • 2008
  • Corpus ID: 11650647
Secure electronic mail (e-mail), such as PGP and S/MIME, uses digital signature to provide message authentication, which also… Expand
  • figure 1
2008
2008
With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders… Expand
  • figure 1
  • figure 2
  • table 1
Highly Cited
2007
Highly Cited
2007
"DomainKeys" creates a domain-level authentication framework for email by using public key technology and the DNS to prove the… Expand
2006
2006
Electronic mail is one of the most used and abused service in today communication. While many efforts have been made to fight e… Expand
Highly Cited
2005
Highly Cited
2005
Acknowledgments The author acknowledges sponsorship from the U.S. Department of Homeland Security, Science and Technology… Expand
2005
2005
The explosion in spam and phishing attacks has cost victims time and money. The attacks have also dented public confidence in e… Expand
  • figure 1
2003
2003
This paper argues that current legislative and private attempts to stop spam are either ineffective, or involve unacceptable… Expand