A SURVEY ON EMAIL BASED TRUST MANAGEMENT SYSTEM
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 1
Abstract
Spoofing is a very common security threat to email applications. Several powerful techniques have been developed to counteract spoofing, but most of them are server-oriented and transparent to the user. Making up for the vast majority of emails transmitted, spam is an annoyance and potential security issue for users, and moreover a superfluous burden to the internet. Despite the maturity of today’s email infrastructure, it is difficult to ensure the authenticity of a sender address for inbound mails. This shortcoming is used by spammers to bypass existing spam protection systems and furthermore poses a security risk to users. Due to this a vast majority of spam emails today are sent from botnets with forged sender addresses. This has attracted researchers over the years to develop email sender authentication mechanism as a promising way to verify identity of the senders. Therefore an urgent need to new mechanisms to circumvent the spoofing threat.
Authors and Affiliations
Jinkal Gajera
SOME PROPERTIES AND THEOREM ON FUZZY SUB-TRIDENT DISTANCE
This paper introduces some simple properties and theorem based on Fuzzy Sub-Trident Distance along with the help of Trapezoidal Fuzzy Numbers. The results are discussed with suitable numerical example.
STRATEGY OF FINDING THE MAXIMUM AND MINIMUM VALUES OF THE FUNCTION OF N- VARIABLES WITH AND WITHOUT CONSTRAINT
This paper is about the finding the maximum and minimum values of the function of n- variables with and without constraint.
NUMERICAL INVESTIGATION ON THE INFLUENCE OF SURFACE TEXTURE HYDRODYNAMIC JOURNAL BEARING USING CFD
Thermohydrodynamic (THD) analysis should therefore be carried out to obtain the realistic performance characteristics of the bearing. So many researchers have been done in this field. Most of these analyses used two dim...
A Survey of Fast Analog Circuit Analysis Algorithm using SPICE
This paper presents a fast analog circuit analysis algorithm, fundamental circuit-based circuit analysis, for circuits being repeatedly modified and verified in product development. The algorithm reuses previous...
An Adaptive Neuro Fuzzy Inference System For Modeling of Cybercrime control
The prevention of cyber crime is indispensable because a single attack may break the security of computer and network systems. There are certain factors which are responsible for cybercrime and their careful manag...