[1]
|
Al-taee, M.A., Al-Hassani, H.N., Bamajbour, B.S. and Al-Jumeily, D. (2009) Biometric-Based Security System for Plaintext e-Mail Messages. Second International Conference on Developments in eSystems Engineering (DESE), Abu Dhabi, 14-16 December 2009, 202-206.
|
[2]
|
Ghafoor, A., Muftic, S. and Schmölzer, G. (2009) CryptoNET: Design and Implementation of the Secure Email System. Proceedings of the 1st International Workshop on Security and Communication Networks (IWSCN), Trondheim, 20-22 May 2009, 402-407.
|
[3]
|
Al-Saadoon, G.M.W. (2011) Authentication and Virus Detection Enhancement for Client and Server Applications. Journal of Emerging Trends in Computing and Information Sciences, 2, 390-395.
|
[4]
|
Baykara, M. and Das, R. (2013) A Steganography Application for Secure Data Communication. International Conference on Electronics, Computer and Computation (ICECCO), Ankara, 7-9 November 2013, 309-313.
|
[5]
|
Cailleux, L., Bouabdallah, A. and Bonnin, J.-M. (2014) Building a Confident Advanced Email System Using a New Correspondence Model. 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Victoria, 13-16 May 2014, 85-90.
|
[6]
|
Shukla, R., Prakash, H.O., Bhushan, R., Venkataraman, S. and Varadan, G. (2013) Sahastradhara Biometric and EToken Integrated Secure Email System. 15th International Conference on Advanced Computing Technologies (ICACT), Rajampet, 21-22 September 2013, 1-4.
|
[7]
|
Kar, J. (2014) Provably Secure Online/Off-Line Identity-Based Signature Scheme for Wireless Sensor Network. International Journal of Network Security, Taiwan, 16, 26-36.
|
[8]
|
Hameed, S., Kloht, T. and Fu, X.M. (2013) Identity Based Email Sender Authentication for Spam Mitigation. Eighth International Conference on Digital Information Management (ICDIM), Islamabad, 10-12 September 2013, 14-19.
|
[9]
|
Stallings, W. (2014) Electronic Mail Security, in Cryptography and Network Security Principles and Practice. 6th Edition, Pearson Education, Upper Saddle River, 591-615.
|
[10]
|
Kar, J. and Majhi, B. (2009) An Efficient Password Security of Three Party Key Exchange Protocol Based on ECDLP. 12th International Conference on Information Technology 2009 (ICIT 2009), Tata McGrow Hill Education Private Limited, Bhubaneswar, 75-78.
|
[11]
|
Kar, J. and Majhi, B. (2009) An Efficient Password Security of Multiparty Key Exchange Protocol Based on ECDLP. International Journal of Computer Science and Security (IJCSS), 3, 405-413.
|
[12]
|
Kar, J. and Majhi, B. (2009) A Secure Two-Party Identity Based Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem. Journal of Information Assurance and Security, 5, 473-482.
|
[13]
|
Zadgaonkar, S., Pandey, V.C. and Pradhan, P.S. (2013) Developing a Model to Enhance E-Mail Authentication against E-Mail Address Spoofing Using Application. International Journal of Science and Modern Engineering (IJISME), 1, 13-17.
|
[14]
|
Mooloo, D. and Fowdur, T.P. (2013) An SSL-Based Client-Oriented Anti-Spoofing Email Application. AFRICON, Pointe-Aux-Piments, 9-12 September 2013, 1-5.
|
[15]
|
Kounelis, I., Muftic, S. and Loschner, J. (2014) Secure and Privacy-Enhanced E-Mail System Based on the Concept of Proxies. 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, 26-30 May 2014, 1405-1410.
|
[16]
|
Jang, J., Nepal, S. and Zic, J. (2008) Trusted Email Protocol: Dealing with Privacy Concerns from Malicious Email Intermediaries. 8th IEEE International Conference on Computer and Information Technology, Sydney, 8-11 July 2008, 402-407.
|