[1]
S. Zhao, “Viable Email Attacks and a Simple End-to-End Security Solution”, ijcs, vol. 3, no. 4, pp. 22–31, Aug. 2018.