2006
DOI: 10.17487/rfc4406
|View full text |Cite
|
Sign up to set email alerts
|

Sender ID: Authenticating E-Mail

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0
2

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(30 citation statements)
references
References 3 publications
(14 reference statements)
0
27
0
2
Order By: Relevance
“…To avoid accepting spam, technologies that verify sender identity before accepting email have been proposed. Prominent examples of email verification systems are DomainKeys [20], [21], SenderID [22], and Sender Policy Framework (SPF) [23]. SPF and SenderID help verify that the machine that sent an email was authorized to do so.…”
Section: In Our Dnssec Data Support Sshfp Implying That the Adoptionmentioning
confidence: 99%
“…To avoid accepting spam, technologies that verify sender identity before accepting email have been proposed. Prominent examples of email verification systems are DomainKeys [20], [21], SenderID [22], and Sender Policy Framework (SPF) [23]. SPF and SenderID help verify that the machine that sent an email was authorized to do so.…”
Section: In Our Dnssec Data Support Sshfp Implying That the Adoptionmentioning
confidence: 99%
“…For example, see [RFC4408], [RFC4406], and [RFC4407] for some current uses of the sending system's IP Address. The IP Address is obtained via underlying Internet information mechanisms and is therefore trusted to be accurate.…”
Section: Prior Workmentioning
confidence: 99%
“…MARID is also based on DNS and can be regarded as a distributed whitelist of authorized MTAs. Multiple MARID drafts have been proposed in which SPF [Wong and Schlitt 2006], Sender ID [Lyon and Wong 2004], and DomainKeys [Delany 2006] have been deployed in some places.…”
Section: Recipient-based Techniquesmentioning
confidence: 99%