Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure | IEEE Conference Publication | IEEE Xplore