Return to Article Details Analysis of domain identification and authentication Download Download PDF