"How is e-mail sender authentication used and misused?"

Tatsuya Mori et al. (2011)

Details and statistics

DOI: 10.1145/2030376.2030380

access: closed

type: Conference or Workshop Paper

metadata version: 2021-07-25

a service of  Schloss Dagstuhl - Leibniz Center for Informatics