E-mail authentication is here, but has it arrived yet?

被引:8
|
作者
Lawton, G
机构
关键词
D O I
10.1109/MC.2005.377
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, most e-mails may contain spam or phishing related data. Addressing the damage brought by such data, vendors came up with two primary authentication proposals: the Sender ID Framework (SIDF) and the Domain Keys Identified Mail (DKIM). SIDF lets the Internet service providers (ISPs) and businesses register their mail server's IP addresses with the Internet Corporation for Assigned Names and Numbers, which manages and coordinates the Domain Name System. The addresses are stored in DNS databases. On the other hand, DKIM is a cryptographic-based e-mail authentication approach that combines two digital-signature-based technologies, namely, the Yahoo-supported DomainKeys and the Cisco-supported Identified Internet Mail.
引用
收藏
页码:17 / 19
页数:3
相关论文
共 50 条
  • [41] The future of military medicine has not arrived yet, but we can see it from here
    Romano, James A., Jr.
    Lam, David M.
    Moses, Gerald R.
    Gilbert, Gary R.
    Marchessault, Ronald, Jr.
    TELEMEDICINE JOURNAL AND E-HEALTH, 2006, 12 (04): : 417 - 425
  • [42] Assessing e-mail intent and tasks in e-mail messages
    Sappelli, M.
    Pasi, G.
    Verberne, S.
    de Boer, M.
    Kraaij, W.
    INFORMATION SCIENCES, 2016, 358 : 1 - 17
  • [43] The inner life of e-mail (Why use e-mail)
    Stevick, Philip
    SALMAGUNDI-A QUARTERLY OF THE HUMANITIES AND SOCIAL SCIENCES, 2007, (153-54): : 3 - 18
  • [44] E-Mail as Legacy: Managing and Preserving E-Mail as a Collection
    Dinneen, Jesse David
    Krtalic, Maja
    PORTAL-LIBRARIES AND THE ACADEMY, 2020, 20 (03) : 413 - 424
  • [45] Registered e-mail (REM) — Reliable e-mail for everybody
    Franco Ruggieri
    Datenschutz und Datensicherheit - DuD, 2010, 34 (5) : 314 - 317
  • [46] HERE COME 2ND-GENERATION E-MAIL SYSTEMS
    EDWARDS, M
    COMMUNICATIONS NEWS, 1995, 32 (03): : 52 - 52
  • [47] Authorship verification of e-mail and tweet messages applied for continuous authentication
    Brocardo, Marcelo Luiz
    Traore, Issa
    Woungang, Isaac
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (08) : 1429 - 1440
  • [48] Spam e-mail: How Malaysian e-mail users deal with it?
    Bujang, Yanti Rosmunie
    Hussin, Husnayati
    World Academy of Science, Engineering and Technology, 2010, 43 : 1007 - 1013
  • [49] Using E-mail to notify pseudonymous E-mail sexual partners
    Vest, Joshua R.
    Valadez, Adolfo M.
    Hanner, Andrea
    Lee, James H.
    Harris, Patrick B.
    SEXUALLY TRANSMITTED DISEASES, 2007, 34 (11) : 840 - 845
  • [50] Third generation has not arrived yet
    Goyal, R.
    BRITISH JOURNAL OF ANAESTHESIA, 2015, 115 (04) : 635 - 635