Login / Signup
Security by Any Other Name: On the Effectiveness of Provider Based Email Security.
Ian D. Foster
Jon Larson
Max Masich
Alex C. Snoeren
Stefan Savage
Kirill Levchenko
Published in:
CCS (2015)
Keyphrases
</>
email
information security
intrusion detection
access control
security issues
security systems
security policies
security threats
security level
user friendliness
security problems
computer security
security requirements
network security
security mechanisms
network management
enron email