Effectiveness and Limitations of E-Mail Security Protocols

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review of E-mail System, Security Protocols and Email Forensics

E-mail is the most common mode of communication today. E-mail not only used for sending messages/text only but also to send audio, video and other files as attachment. It is main resource for business communication. As it is most popular and common mode of communication on internet, it also attracts criminals or persons having mischievous intent. Cyber criminals misuse it for sending spam, thre...

متن کامل

Transparent Internet E-mail Security

This paper describes the design and prototype implementation of a comprehensive system for securing Internet e-mail transparently, so that the only user intervention required is the initial setup and speciication of a trust policy. Our system uses the PolicyMaker trust management engine for evaluating the trustworthiness of keys, in particular whether the given binding between key and name is v...

متن کامل

Researching and Structuring e-mail Security Criteria

Validity and efficiency of e-mail use in business communication have not been disputable for a long time. But what is disputable is security and risks of e -mail use. It is in danger because of threats coming from different sources and forms of work. E-mail content, computer data, corporative networks as well as business processes and image and partner’s trust can also be in danger. This paper ...

متن کامل

E-Mail Security as Cooperation Problem

E-mail communication still has to cope with certain security problems. The most visible result is the mass of unsolicited messages outnumbering the regular e-mails in magnitudes. The technical reasons for this unfavorable situation are manifold, e.g., unreliable sender authentication, loose and ad-hoc coupling between the involved servers, and only few ways to complain about misbehavior of user...

متن کامل

Practical Security in E-Mail Applications

This paper deals with practicability issues of encrypted e-mails. A quick survey on the status quo indicates that popular e-mail clients lack substantial practicability qualities, for example searching in encrypted e-mails. Other approaches such as De-Mail provide solutions, but offer transport encryption only. We present and discuss a number of improvements to the practicability of e-mail encr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Distributed and Parallel systems

سال: 2011

ISSN: 2229-3957

DOI: 10.5121/ijdps.2011.2304