Proposing Enhanced E-Mail Security Mechanism (EEMSM) for Reducing Cyber Crimes

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introduction to the Cyber-of-Things: Cyber-crimes and Cyber-Security Mini-track

The continuous amalgamation of technology into the ever increasing facets of everyday life are conducive to encouraging cyber-crimes and cybersecurity evolution and diversification. Hence, responses that address resulting concerns presented in this mini-track include ‘A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams’, ‘A ThreatVulnerability Bas...

متن کامل

Transparent Internet E-mail Security

This paper describes the design and prototype implementation of a comprehensive system for securing Internet e-mail transparently, so that the only user intervention required is the initial setup and speciication of a trust policy. Our system uses the PolicyMaker trust management engine for evaluating the trustworthiness of keys, in particular whether the given binding between key and name is v...

متن کامل

Designing a Data Warehouse for Cyber Crimes

One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore de...

متن کامل

E-Mail Security as Cooperation Problem

E-mail communication still has to cope with certain security problems. The most visible result is the mass of unsolicited messages outnumbering the regular e-mails in magnitudes. The technical reasons for this unfavorable situation are manifold, e.g., unreliable sender authentication, loose and ad-hoc coupling between the involved servers, and only few ways to complain about misbehavior of user...

متن کامل

Researching and Structuring e-mail Security Criteria

Validity and efficiency of e-mail use in business communication have not been disputable for a long time. But what is disputable is security and risks of e -mail use. It is in danger because of threats coming from different sources and forms of work. E-mail content, computer data, corporative networks as well as business processes and image and partner’s trust can also be in danger. This paper ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2016

ISSN: 0975-8887

DOI: 10.5120/ijca2016911972