Analysis of security extension protocol in e-mail system

E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for governme...

Full description

Saved in:
Bibliographic Details
Main Authors: Jingjing SHANG, Yujia ZHU, Qingyun LIU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2020-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020083
Tags: Add Tag
No Tags, Be the first to tag this record!