Efficiency and Limitation of Secure Protocol

Abstract

Nowadays email plays an important role in day to day activity. But receiving the mail in a secure manner. The security is one of the critical areas where we have to analyze all sort of in-convenient and privacy of the user. To establish the email security, we have to analyz specify the efficiency and the limitation of the secure protocol. Most of the email system send message from one server to another by using Simple Mail Transfer Protocol (SMTP) [1]. It is an application layered protocol. The message can be retrieved by POP or IMAP. To pursue authentication and confidentiality service, we use PGP. S/MIME is a standardize protocol used to encrypt and digitally sign email correspondence. Further, the study

Authors and Affiliations

N. Vijayalakshmi

Keywords

Related Articles

 SEQUENTIAL DATA MINING: EXPLORING THE REDUNDANT PATTERNS FROM SEQUENCES TO MINIMIZE THE OVERALL PATTERNS

 Recent studies in discovering patterns from sequence data have shown the significant impact in many aspects of data mining. In this research, a novel method of finding the redundant pattern is proposed. To efficie...

ANALYZING THE RETAILER'S PROFIT IN ELECTRICITY MARKET BASED ON CONSUMER'S BEHAVIOR

Due to exchange costs, only huge consumers select direct buy from wholesale market. Most small and medium consumers, buy energy from retail market (this market has bought electricity from wholesale market). In this model...

EFFICIENT ACCESS CONTROL SECURITY ASSURANCE IN CLOUD COMPUTING USING BGKM WITH SHAMIR

Cloud computing relies on restricting discussing of resources to obtain coherence and financial systems of range, just like an application (like the power grid) over a network. The secure transmitting of details among w...

LED SCORILING DISPLAY USING THE MICROCONTROLLER

Now a days display is most important thing/ organization or public utility places like hospitals, Railway stations, collages,hotels,shopsand parks. sticking paper is easy but naturally disaster. This project deals about...

 Speed Control of Induction Motor Drive Based on Indirect Vector Control Using PI Controller

 The induction motors were characterized by complex, highly non-linear and time-varying dynamics, and hence their speed control is a challenging problem in the industry. The advent of vector control techniques has...

Download PDF file
  • EP ID EP138274
  • DOI -
  • Views 75
  • Downloads 0

How To Cite

N. Vijayalakshmi (30). Efficiency and Limitation of Secure Protocol. International Journal of Engineering Sciences & Research Technology, 1(9), 539-544. https://europub.co.uk/articles/-A-138274