E-mail spoofing based on the datalink layers and its application to e-mail aggregation systems: is it possible to make good use of e-mail spoofing?
暂无分享,去创建一个
[1] Giuseppe Longo. Mathematical Structures in Computer Science , 2012 .
[2] Shigeo Akashi,et al. Classification of DHCP Spoofing and Effectiveness of DHCP Snooping , 2019 .
[3] Mark Delany,et al. Domain-Based Email Authentication Using Public Keys Advertised in the DNS (DomainKeys) , 2007, RFC.
[4] Christian E. Hopps,et al. Analysis of an Equal-Cost Multi-Path Algorithm , 2000, RFC.
[5] Murray S. Kucherawy,et al. DomainKeys Identified Mail (DKIM) Signatures , 2011, RFC.
[6] Murray S. Kucherawy,et al. Domain-based Message Authentication, Reporting, and Conformance (DMARC) , 2015, RFC.