iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation.
Sufian HameedTobias KlohtXiaoming FuPublished in: SECRYPT (2012)
Keyphrases
- key distribution
- authentication and key agreement
- identity based cryptography
- spam detection
- spam filtering
- anti spam
- key management
- public key cryptography
- signcryption scheme
- security analysis
- signature scheme
- authentication protocol
- encryption scheme
- risk management
- user authentication
- image authentication
- fault tolerant
- spam filters
- biometric authentication
- identity authentication
- fragile watermarking
- email spam
- spam e mail
- authentication scheme
- elliptic curve
- security mechanisms
- resource constrained
- authentication mechanism
- spam classification
- secret key
- lightweight