How is e-mail sender authentication used and misused?

Tatsuya Mori, Yousuke Takahashi, Kazumichi Sato, Keisuke Ishibashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Fingerprint Dive into the research topics of 'How is e-mail sender authentication used and misused?'. Together they form a unique fingerprint.

Engineering & Materials Science