How is e-mail sender authentication used and misused?

Tatsuya Mori, Kazumichi Sato, Yousuke Takahashi, Keisuke Ishibashi. How is e-mail sender authentication used and misused?. In Vidyasagar Potdar, editor, The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings. pages 31-37, ACM, 2011. [doi]

@inproceedings{MoriSTI11,
  title = {How is e-mail sender authentication used and misused?},
  author = {Tatsuya Mori and Kazumichi Sato and Yousuke Takahashi and Keisuke Ishibashi},
  year = {2011},
  doi = {10.1145/2030376.2030380},
  url = {http://doi.acm.org/10.1145/2030376.2030380},
  researchr = {https://researchr.org/publication/MoriSTI11},
  cites = {0},
  citedby = {0},
  pages = {31-37},
  booktitle = {The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings},
  editor = {Vidyasagar Potdar},
  publisher = {ACM},
  isbn = {978-1-4503-0788-8},
}