Effectiveness and Limitations of E-Mail Security Protocols
نویسندگان
چکیده
منابع مشابه
Review of E-mail System, Security Protocols and Email Forensics
E-mail is the most common mode of communication today. E-mail not only used for sending messages/text only but also to send audio, video and other files as attachment. It is main resource for business communication. As it is most popular and common mode of communication on internet, it also attracts criminals or persons having mischievous intent. Cyber criminals misuse it for sending spam, thre...
متن کاملTransparent Internet E-mail Security
This paper describes the design and prototype implementation of a comprehensive system for securing Internet e-mail transparently, so that the only user intervention required is the initial setup and speciication of a trust policy. Our system uses the PolicyMaker trust management engine for evaluating the trustworthiness of keys, in particular whether the given binding between key and name is v...
متن کاملResearching and Structuring e-mail Security Criteria
Validity and efficiency of e-mail use in business communication have not been disputable for a long time. But what is disputable is security and risks of e -mail use. It is in danger because of threats coming from different sources and forms of work. E-mail content, computer data, corporative networks as well as business processes and image and partner’s trust can also be in danger. This paper ...
متن کاملE-Mail Security as Cooperation Problem
E-mail communication still has to cope with certain security problems. The most visible result is the mass of unsolicited messages outnumbering the regular e-mails in magnitudes. The technical reasons for this unfavorable situation are manifold, e.g., unreliable sender authentication, loose and ad-hoc coupling between the involved servers, and only few ways to complain about misbehavior of user...
متن کاملPractical Security in E-Mail Applications
This paper deals with practicability issues of encrypted e-mails. A quick survey on the status quo indicates that popular e-mail clients lack substantial practicability qualities, for example searching in encrypted e-mails. Other approaches such as De-Mail provide solutions, but offer transport encryption only. We present and discuss a number of improvements to the practicability of e-mail encr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Distributed and Parallel systems
سال: 2011
ISSN: 2229-3957
DOI: 10.5121/ijdps.2011.2304