Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Sender ID

Known as: Sender-ID, SenderID 
Sender ID is an anti-spoofing proposal from the former MARID IETF working group that tried to join Sender Policy Framework (SPF) and Caller ID… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
This paper presents a failure diagnosis algorithm for summarizing and generalizing patterns that lead to instances of anomalous… Expand
  • table 1
  • table 3
  • table 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Internet mail suffers from the fact that much unwanted mail is sent using spoofed addresses -- "spoofed" in this case means that… Expand
Is this relevant?
2006
2006
This document defines an algorithm by which, given an e-mail message, one can extract the identity of the party that appears to… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Acknowledgments The author acknowledges sponsorship from the U.S. Department of Homeland Security, Science and Technology… Expand
Is this relevant?
2005
2005
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2005
2005
Anonymity in peer-to-peer network means that it is difficult to associate a particular communication with a sender or a recipient… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2004
2004
A desired attribute in safety-critical embedded real-time systems is a system time and event synchronization capability on which… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes… Expand
Is this relevant?
2001
2001
A desired attribute in safety critical embedded real-time systems is a system time/event synchronization capability on which… Expand
  • figure 3
  • table 2
  • table 1
Is this relevant?
1990
1990
An open architecture for distributed form management is described. The model employs object-orientation in describing… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?