Survey of domain keys identified mail

This paper introduced the conception and framework of DKIM,expatiating the working flow with examples and discussed threats and the prospect of DKIM.