A SURVEY ON EMAIL BASED TRUST MANAGEMENT SYSTEM
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 1
Abstract
Spoofing is a very common security threat to email applications. Several powerful techniques have been developed to counteract spoofing, but most of them are server-oriented and transparent to the user. Making up for the vast majority of emails transmitted, spam is an annoyance and potential security issue for users, and moreover a superfluous burden to the internet. Despite the maturity of today’s email infrastructure, it is difficult to ensure the authenticity of a sender address for inbound mails. This shortcoming is used by spammers to bypass existing spam protection systems and furthermore poses a security risk to users. Due to this a vast majority of spam emails today are sent from botnets with forged sender addresses. This has attracted researchers over the years to develop email sender authentication mechanism as a promising way to verify identity of the senders. Therefore an urgent need to new mechanisms to circumvent the spoofing threat.
Authors and Affiliations
Jinkal Gajera
EXPERIMENTAL ANALYSIS OF CORRUGATED FLATE PLATE COLLECTOR FOR EFFLUENT EVAPORATION
Many industrial processes produce effluents also termed as waste water which can cause damage to environment if not treated properly. Evaporation of water content of effluent results in reducing quantity of the stuff an...
Monitoring of Ambient Air Quality in India - A Review
Air pollution is a serious problem all over the world which causes terrific loss to human health and other living being. Sulphur Dioxide(SO2),Nitrogen Dioxide(NO2),Particulate Matter (PM2.5, PM10), Ozone(O3), Lead...
Statistical Optimization of Process Parameters for Dye Biosorption onto Biomass
In the present study, sorption of reactive azo dye, Blue H_3 R from aqueous solution on an efficient, economically biomass (sewage sludge) was investigate. Batch experiments have been carried out to find the effec...
Total Survey of Data Security Issues in Cloud Computing
In today’s IT era cloud computing is the most preferable research topic. In cloud computing data storage, data transfer can be possible. So that, data security is the main aspect of cloud computing and also for an...
Geoinformatics for Coastal Wetland Inventory of Krishna District, Andhra Pradesh
Coastal wetlands include littoral zones, brackish water and estuarine regions, lagoons and coral reefs. These wetlands in the world being great ecological and economic significance, global efforts are being made t...