Article,

Developing a Model to Enhance E-Mail Authentication against E-Mail Address Spoofing using Application

, , and .
International Journal of Innovative Science and Modern Engineering (IJISME), 1 (6): 13-17 (May 2013)

Abstract

E-mail is one of the most commonly used communication mechanisms. Most of the recipients and senders desire secure e-mail exchange. Senders want to make sure that the recipient is really the intended recipient, and the message arrives to the recipient confidentially. On the other hand, recipients want to make sure that the sender is the entity who it claims to be, and the arrived message has not been maliciously modified and examined during transmission. These requirements can be satisfied by the e-mail applications that use public key cryptosystem (PKC) as the security base, such as S/MIME and PGP. The main handicap behind the deployment of applications that use PKC is the problem of public key distribution with a legitimate binding with its owner. Moreover, public key management features, such as update, delete operations must be performed in a secure way.

Tags

Users

  • @ijisme_beiesp

Comments and Reviewsshow / hide

  • @ijisme_beiesp
    3 years ago (last updated 3 years ago)
    good
Please log in to take part in the discussion (add own reviews or comments).