Enhancing Security at Email End Point

Author(s):  
Babak Sokouti ◽  
Massoud Sokouti

Although email security needs more attention, a small amount of research has been conducted. Most of the security properties that can be applied to the email messages are based on encryption and digital signatures. The cryptography techniques that can be both symmetric and asymmetric algorithms cannot prove the identity of the sender and receiver in the real world, which is related to the end point security. Additionally, these techniques are not capable of preventing the spams, scams, and spoofing attacks. A new secure email system based on fingerprint identification is proposed to overcome the recognition of the real identity of the email sender and receiver. This method uses the user’s username and password hashes, their full name and personal image, and fingerprint hashes along with the email message hash. The proposed method is successfully evaluated against security, maintenance, operational, and privacy issues.

2010 ◽  
Vol 20 (3) ◽  
pp. 100-105 ◽  
Author(s):  
Anne K. Bothe

This article presents some streamlined and intentionally oversimplified ideas about educating future communication disorders professionals to use some of the most basic principles of evidence-based practice. Working from a popular five-step approach, modifications are suggested that may make the ideas more accessible, and therefore more useful, for university faculty, other supervisors, and future professionals in speech-language pathology, audiology, and related fields.


2006 ◽  
Vol 40 (7) ◽  
pp. 47
Author(s):  
LEE SAVIO BEERS
Keyword(s):  

2016 ◽  
Author(s):  
Lawrence A. Cunningham
Keyword(s):  

1976 ◽  
Vol 31 (4) ◽  
pp. 303-310 ◽  
Author(s):  
Harold M. Proshansky

Sign in / Sign up

Export Citation Format

Share Document