Tham khảo DomainKeys Identified Mail

  1. Tony Hansen; Dave Crocker; Phillip Hallam-Baker (July 2009). DomainKeys Identified Mail (DKIM) Service Overview. IETF. RFC 5585. https://tools.ietf.org/html/rfc5585. Truy cập ngày 6 tháng 1 năm 2016. "Receivers who successfully verify a signature can use information about the signer as part of a program to limit spam, spoofing, phishing, or other undesirable behaviors. DKIM does not, itself, prescribe any specific actions by the recipient; rather, it is an enabling technology for services that do." 
  2. Dave Crocker; Tony Hansen; Murray S. Kucherawy, eds (September 2011). "Data Integrity". DomainKeys Identified Mail (DKIM) Signatures. IETF. sec. 1.5. RFC 6376. https://tools.ietf.org/html/rfc6376#section-1.5. Truy cập ngày 6 tháng 1 năm 2016. "Verifying the signature asserts that the hashed content has not changed since it was signed and asserts nothing else about "protecting" the end-to-end integrity of the message." 

Ghi chú