A SURVEY ON EMAIL BASED TRUST MANAGEMENT SYSTEM
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 1
Abstract
Spoofing is a very common security threat to email applications. Several powerful techniques have been developed to counteract spoofing, but most of them are server-oriented and transparent to the user. Making up for the vast majority of emails transmitted, spam is an annoyance and potential security issue for users, and moreover a superfluous burden to the internet. Despite the maturity of today’s email infrastructure, it is difficult to ensure the authenticity of a sender address for inbound mails. This shortcoming is used by spammers to bypass existing spam protection systems and furthermore poses a security risk to users. Due to this a vast majority of spam emails today are sent from botnets with forged sender addresses. This has attracted researchers over the years to develop email sender authentication mechanism as a promising way to verify identity of the senders. Therefore an urgent need to new mechanisms to circumvent the spoofing threat.
Authors and Affiliations
Jinkal Gajera
Memory Optmization In Map Decoding Algorithm Using Trace Forward Technique In Turbo Decoder By Using Of VLSI Implementation
Iterative decoding of convolutional turbo code (CTC) has a large memory power consumption. To reduce the power consumption of the state metrics cache (SMC), low-power memory-reduced traceforward maximum a posterio...
ANALYSIS OF VAPOUR COMPRESSION REFRIGERATION SYSTEM WITH SUB- COOLING AND SUPER HEATING WITH THREE DIFFERENT REFRIGERANTS FOR AIR-CONDITIONING APPLICATIONS
This paper presents the simulated results of vapour compression system with sub-cooling and superheating and to compare the system performance for three refrigerants i.e. R22, R410A and R32. For simulation 1 “TR” (...
A REVIEW PAPER ON HREF BASED ROUTE SELECTION IN AODV FOR MANETS
Mobile ad hoc networks are self-organizing networks composed of independent mobile nodes. All mobile nodes act as router as well as hosts. The most important characteristic of MANETs is their dynamically changing...
SUB-TRIDENT FORM USING FUZZY AGGREGATION
This Paper deals with the solution to find the Optimal Path and the Optimal Solution with the help of Fuzzy Aggregation Operations such as Arithmetic Mean and Geometric Mean and by using Trapezoidal Fuzzy Numbers...
REDUCING POWER DISSIPATION IN SELF STARTING AND SELF CORRECTING COUNTER USING A LOOK-AHEAD CLOCK GATING
In this paper, a novel Self-starting and Self-correcting counter implemented with some techniques are presented to reduce the power consumption in sequential circuits. Clock gating is a predominant technique used...