Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,855 papers from all fields of science
Search
Sign In
Create Free Account
Email authentication
Known as:
Authenticated Email
, E-mail authentication
, Email-validation
Email authentication, or validation, is a collection of techniques aimed at equipping messages of the email transport system with verifiable…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Anti-spam techniques
Authentication
Authorization
Bounce address
Expand
Broader (1)
Spamming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Email Authentication for Internationalized Mail
J. Levine
Request for Comments
2019
Corpus ID: 168619377
SPF (RFC7208), DKIM (RFC6376), and DMARC (RFC7489) enable a domain owner to publish e-mail authentication and policy information…
Expand
2019
2019
Poisoning Sender Policy Framework
Sanjib Sinha
Bug Bounty Hunting for Web Security
2019
Corpus ID: 209080987
Sender Policy Framework (SPF) is a technical standard that helps protect e-mail senders and recipients from spam, spoofing, and…
Expand
Review
2013
Review
2013
Review and Study of Trusted email Protocols : Email author identification and Email Authentication
Pushpendra Kumar Pateriya
2013
Corpus ID: 14569736
On internet securing email has forever been an important issue because electronic mail is the basic internet services for…
Expand
2012
2012
Fault Detection and Deployment of Security Mechanisms in E-mail Systems
Kulvinder Singh Handa
,
Sanjeev Dhawan
2012
Corpus ID: 15302162
This paper present the realistic flaws and design implementation of security mechanisms in current e-mail services for…
Expand
2008
2008
Tracking Email Reputation for Authenticated Sender Identities
G. Singaraju
,
Jeffrey Moss
,
Brent Byunghoon Kang
International Conference on Email and Anti-Spam
2008
Corpus ID: 8065081
With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders…
Expand
2008
2008
Design and Analysis of a Secure Email Authentication System Based on Identity-based Encryption
Liu Hong
2008
Corpus ID: 64065618
To resolve the security problem in email system,a new ID-based authentication scheme for email system is proposed and implemented…
Expand
2005
2005
E-mail authentication is here, but has it arrived yet?
G. Lawton
Computer
2005
Corpus ID: 44515632
The explosion in spam and phishing attacks has cost victims time and money. The attacks have also dented public confidence in e…
Expand
2005
2005
Lightweight Signatures for Email
Ben AdidaDavid ChauSusan Hohenberger
,
Ronald L. Rivest
2005
Corpus ID: 12525187
We present the design and prototype implementation of a new public key infrastucture for email authentication. Our approach…
Expand
2003
2003
Giving e-mail back to the users: Using digital signatures to solve the spam problem
Trevor Tompkins
,
D. Handley
First Monday
2003
Corpus ID: 39249116
This paper argues that current legislative and private attempts to stop spam are either ineffective, or involve unacceptable…
Expand
1999
1999
DNSWL Email Authentication Method Extension
A. Vesely
1999
Corpus ID: 63118672
This document describes an additional Email Authentication Method compliant with RFC 8601. The method consists in looking up the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE