A SURVEY ON EMAIL BASED TRUST MANAGEMENT SYSTEM
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 1
Abstract
Spoofing is a very common security threat to email applications. Several powerful techniques have been developed to counteract spoofing, but most of them are server-oriented and transparent to the user. Making up for the vast majority of emails transmitted, spam is an annoyance and potential security issue for users, and moreover a superfluous burden to the internet. Despite the maturity of today’s email infrastructure, it is difficult to ensure the authenticity of a sender address for inbound mails. This shortcoming is used by spammers to bypass existing spam protection systems and furthermore poses a security risk to users. Due to this a vast majority of spam emails today are sent from botnets with forged sender addresses. This has attracted researchers over the years to develop email sender authentication mechanism as a promising way to verify identity of the senders. Therefore an urgent need to new mechanisms to circumvent the spoofing threat.
Authors and Affiliations
Jinkal Gajera
Effectually Global Position Finding Of Accident Detection Using Wireless Sensor Network
This paper describes an original idea to detects accidents. The idea has been developed keeping in mind the considerations of cost and compatibility with existing system. The Short Message Service or SMS as it is...
OPTIMIZATION AND ANALYSIS OF SLANT BED - A REVIEW
For the Mechanical Design Engineering we have face many complex problem of structural design, the solution of that type of problems are not possible with analytical methods. In such case we have to use the Numeric...
ENHANCING SECURED CLOUD SERVICES BY LOAD BALANCING & ENERGY EFFICIENCY TECHNIQUES
[b]Cloud computing is at its boon. Cloud computing is provide to manage a large amount of database in the networking, for that purpose large power is required which is provided by the power plant. Carbon emission...
Shape Matching Technique vs Bounding Volume Technique in 3D Object Picking
In this paper we present an analytical study to pick 3D objects based on their shape pointing device in a 3D environment. We adapt a 2D picking metaphor to 3D selection in 3D environments by changing the projectio...
E- Nagarpalika
Information technology has become one of the foundation fundamentals of managerial change, and electronic government (e-government) may shape significantly in future governance. The first generation egovernance i...