Analysis of security extension protocol in e-mail system
E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for governme...
Saved in:
Main Authors: | Jingjing SHANG, Yujia ZHU, Qingyun LIU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2020-12-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020083 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
EN-Bypass: a security assessment method on e-mail user interface notification
by: Jingyi YUAN, et al.
Published: (2023-06-01) -
SDN based e-mail repudiation source restraining method
by: Zhi-geng HAN, et al.
Published: (2016-09-01) -
Spam filtering algorithm based on geographic E-mail path analysis
by: ZHANG Ni1, et al.
Published: (2007-01-01) -
De l’hyper-connexion à la déconnexion : quand les entreprises tentent de réguler l’usage professionnel des e-mails
by: Magali Prost, et al.
Published: (2012-11-01) -
An Educational Leader’s E-Mails to the Parents During COVID-19 Pandemic
by: Corinne Brion, et al.
Published: (2021-12-01)