E-mail spoofing based on the datalink layers and its application to e-mail aggregation systems: is it possible to make good use of e-mail spoofing?
Abstract
References
Index Terms
- E-mail spoofing based on the datalink layers and its application to e-mail aggregation systems: is it possible to make good use of e-mail spoofing?
Recommendations
Forensic Analysis of E-mail Date and Time Spoofing
ICCCT '12: Proceedings of the 2012 Third International Conference on Computer and Communication TechnologyThere are no adequate and proactive mechanisms for securing E-mail systems. E-mail date and time spoofing is one of the major problems of E-mail security. The effects of E-mail spoofing can be limited by the appropriate configuration of E-mail servers ...
Analyzing Internet e-mail date-spoofing
Spammers and phishers constantly keep on changing spam structure to circumvent anti-spam procedures and target maximum recipients. Of late, it has been observed that spammers spoof date header of their spam e-mails to keep them on top in the recipient's ...
Envoys in electronic mail systems
COCS '86: Proceedings of the third ACM-SIGOIS conference on Office information systemsEnvoys are electronic mail messages that make requests at remote electronic mailers. Envoys differ from conventional messages in that they might be routed to recipients that have not been specified, their requests can often be carried out with no human ...
Comments
Information & Contributors
Information
Published In

- Conference Chairs:
- Alexander Balinsky,
- Ah-Hwee Tan,
- Wernhuar Tarng
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 86Total Downloads
- Downloads (Last 12 months)7
- Downloads (Last 6 weeks)0
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in