Secure Mailing System

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure E-mailing Between Physicians and Patients

Secure e-mailing between Kaiser Permanente physicians and patients is widespread; primary care providers receive an average of 5 e-mails from patients each workday. However, on average, secure e-mailing with patients has not substantially impacted primary care provider workloads. Secure e-mail has been associated with increased member retention and improved quality of care. Separate studies ass...

متن کامل

VistaMail: An Integrated Multimedia Mailing System

13 I magine sitting at your desk at home and checking your electronic mail. An audiovisual clip of your family members hundreds of miles away pops up with warm greetings and family news. This scenario lies within the capability of the integrated multimedia mailing system, called VistaMail, developed at the University of Illinois at Urbana-Champaign. VistaMail provides smooth and seamless transi...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution

Proxy encryption schemes transform cipher-text from one key to another without revealing the plain-text. Agents that execute such transformations are therefore minimally trusted in distributed systems leading to their usefulness in many applications. However, till date no application of proxy encryption has been deployed and used in practice. In this work we describe our efforts in developing a...

متن کامل

Mining NANOG Mailing List∗

It had been shown that the misbehaviors by few malicious, compromised or misconfigured BGP routers could lead to serious outages in Internet. This failing becomes progressively crucial as the recent prosper of outage-sensitive applications such as Voice over IP, streaming media, and video conferencing. To address these misbehaviors, previous work mainly focus on distributedly detect or prevent ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJARCCE

سال: 2017

ISSN: 2278-1021

DOI: 10.17148/ijarcce.2017.6424