Designated Mailers Protocol/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>David MacQuigg (New page: {{subpages}} <!-- INSTRUCTIONS, DELETE AFTER READING: Related Articles pages link to existing and proposed articles that are related to the present article. These lists of links double as...) |
No edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 7: | Line 7: | ||
==Parent topics== | ==Parent topics== | ||
{{r|Email system | {{r|Email system}} | ||
{{r|Email authentication}} | {{r|Email authentication}} | ||
Line 15: | Line 15: | ||
==Other related topics== | ==Other related topics== | ||
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. --> | <!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. --> | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Asymmetric key cryptography}} | |||
{{r|Email forwarding problem}} |
Latest revision as of 11:00, 6 August 2024
- See also changes related to Designated Mailers Protocol, or pages that link to Designated Mailers Protocol or to this page or whose text contains "Designated Mailers Protocol".
Parent topics
- Email system [r]: General overview of how the Internet electronic mail system works. [e]
- Email authentication [r]: Brief overview of methods used to authenticate the sender of an email. [e]
Subtopics
- Asymmetric key cryptography [r]: A category of cryptographic techniques, which greatly simplify key management, which are based on mathematically related key pairs, such that the "public" key can be used to encrypt and be freely available, and only the holder of the "private" key can decrypt the message [e]
- Email forwarding problem [r]: The authentication failures that occur in some popular IP-based Email authentication methods when a forwarder is involved. [e]