How is e-mail sender authentication used and misused?
Tatsuya MoriKazumichi SatoYousuke TakahashiKeisuke IshibashiPublished in: CEAS (2011)
Keyphrases
- spam filtering
- biometric authentication
- text mining
- identity authentication
- electronic mail
- instant messaging
- image authentication
- user authentication
- fragile watermarking
- communication medium
- authentication protocol
- real time
- anti spam
- identity management
- database
- spam filters
- spam detection
- security analysis
- public key
- wireless networks
- multimodal biometrics
- case study
- keystroke dynamics
- genetic algorithm
- data encryption
- authentication mechanism
- integrity verification
- semi fragile watermarking