Academic literature on the topic 'Email Authentication Protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Email Authentication Protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Email Authentication Protocols"
Kim, Tae Jin, Yu Xue Piao, Chang Ho Seo, and Jeong Hyun Yi. "Automatic Email Configuration System Using Multimodal Authentication Interfaces for Smartphones." Applied Mechanics and Materials 411-414 (September 2013): 7–11. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.7.
Full textGunn, Lachlan J., Ricardo Vieitez Parra, and N. Asokan. "Circumventing Cryptographic Deniability with Remote Attestation." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (2019): 350–69. http://dx.doi.org/10.2478/popets-2019-0051.
Full textNasir, Manir, Danlami Gabi, Salihu Alhassan Libata, and Mujtaba Haruna. "COUNTERMEASURE TO MAN-IN-THE-MIDDLE ATTACK BASED ON EMAIL HIJACKING USING TRY-HYBRID SUPERVISED LEARNING TECHNIQUES." FUDMA JOURNAL OF SCIENCES 9, no. 2 (2025): 66–74. https://doi.org/10.33003/fjs-2025-0902-3062.
Full textBeck, Gabrielle, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, and Pratyush Ranjan Tiwari. "Time-Deniable Signatures." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 79–102. http://dx.doi.org/10.56553/popets-2023-0071.
Full textSavya, Savya, R. Mohanraj, K. Sharada, Savya Sachi, K. Neelima, and Punyala Ramadevi. "Securing the Digital Commerce Spectrum and Cyber Security Strategies for Web, E-commerce, M-commerce, and E-mail Security." Journal of Cybersecurity and Information Management 14, no. 1 (2024): 34–49. http://dx.doi.org/10.54216/jcim.140103.
Full textGuest, Jodie L., Elizabeth Adam, Iaah L. Lucas, et al. "Methods for Authenticating Participants in Fully Web-Based Mobile App Trials from the iReach Project: Cross-sectional Study." JMIR mHealth and uHealth 9, no. 8 (2021): e28232. http://dx.doi.org/10.2196/28232.
Full textGrindrod, Kelly, Jonathan Boersema, Khrystine Waked, Vivian Smith, Jilan Yang, and Catherine Gebotys. "Locking it down." Canadian Pharmacists Journal / Revue des Pharmaciens du Canada 150, no. 1 (2016): 60–66. http://dx.doi.org/10.1177/1715163516680226.
Full textMusliyana, Zuhar, Andita Ghaitsa Satira, Mahendar Dwipayana, and Ayu Helinda. "Integrated Email Management System Based Google Application Programming Interface Using OAuth 2.0 Authorization Protocol." Elkawnie 6, no. 1 (2020): 109. http://dx.doi.org/10.22373/ekw.v6i1.5545.
Full textKhalifa, Othman, Tengku Hanis Sofea Binti Tengku Nor Effendy, Muhammed Zaharadeen Ahmed, Elmahdi El-Khazmi, and Abdelrahim Nasser Esgiar. "Blockchain Based Email Security to Mitigate Phishing Attack." Asian Journal of Electrical and Electronic Engineering 4, no. 2 (2024): 77–86. https://doi.org/10.69955/ajoeee.2024.v4i2.73.
Full textLi, Daoming, Qiang Chen, and Lun Wang. "Phishing Attacks: Detection and Prevention Techniques." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 48–53. https://doi.org/10.5281/zenodo.12789572.
Full textBooks on the topic "Email Authentication Protocols"
Heinlein, Peer. The book of IMAP: Building a mail server with Courier and Cyrus. Open Source Press, 2008.
Find full textBook chapters on the topic "Email Authentication Protocols"
Vazquez Sandoval, Itzel, and Gabriele Lenzini. "A Formal Security Analysis of the $$p\equiv p$$ Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email." In Lecture Notes in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39749-4_11.
Full textKaur, Kashish Preet, Sunil K. Singh, Sudhakar Kumar, et al. "Advanced Tools and Technologies for Phishing Prevention." In Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch009.
Full textConference papers on the topic "Email Authentication Protocols"
Chauhan, Prashant D., and Apurva M. Shah. "Effectiveness of Anti-Spoofing Protocols for Email Authentication." In 2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT). IEEE, 2023. http://dx.doi.org/10.1109/icct56969.2023.10076098.
Full textNiehues, Lucas Boppre, and Ricardo Custódio. "Privacy-aware web authentication protocol with recovery and revocation." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19510.
Full text