Academic literature on the topic 'Email Authentication Protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Email Authentication Protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Email Authentication Protocols"

1

Kim, Tae Jin, Yu Xue Piao, Chang Ho Seo, and Jeong Hyun Yi. "Automatic Email Configuration System Using Multimodal Authentication Interfaces for Smartphones." Applied Mechanics and Materials 411-414 (September 2013): 7–11. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.7.

Full text
Abstract:
Email services are among the services most frequently utilized by smartphone users. However, setting up a smartphone email service is very frustrating for ordinary users as the process requires knowledge of complicated email server protocols and types of security. To eliminate the inconvenience, a method in which web mail setting information is preconfigured within an app has been applied to representative smartphone email accounts. However, it is not practical nor realistic to store all web mail setting information in the app; furthermore, private server setting information for schools, working areas and so on, has to be separately established by users. In this paper, we propose a system that removes these inconveniences faced when setting up smartphone email services. The proposed system automatically downloads setting information preconfigured on the email server for users.
APA, Harvard, Vancouver, ISO, and other styles
2

Gunn, Lachlan J., Ricardo Vieitez Parra, and N. Asokan. "Circumventing Cryptographic Deniability with Remote Attestation." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (2019): 350–69. http://dx.doi.org/10.2478/popets-2019-0051.

Full text
Abstract:
Abstract Deniable messaging protocols allow two parties to have ‘off-the-record’ conversations without leaving any record that can convince external verifiers about what either of them said during the conversation. Recent events like the Podesta email dump underscore the importance of deniable messaging to politicians, whistleblowers, dissidents and many others. Consequently, messaging protocols like Signal and OTR are designed with cryptographic mechanisms to ensure deniable communication, irrespective of whether the communications partner is trusted. Many commodity devices today support hardware-assisted remote attestation which can be used to convince a remote verifier of some property locally observed on the device. We show how an adversary can use remote attestation to undetectably generate a non-repudiable transcript from any deniable protocol (including messaging protocols) providing sender authentication, proving to skeptical verifiers what was said. We describe a concrete implementation of the technique using the Signal messaging protocol. We then show how to design protocols that are deniable even against an adversary capable of attestation, and in particular how attestation itself can be used to restore deniability by thwarting realistic classes of adversary.
APA, Harvard, Vancouver, ISO, and other styles
3

Nasir, Manir, Danlami Gabi, Salihu Alhassan Libata, and Mujtaba Haruna. "COUNTERMEASURE TO MAN-IN-THE-MIDDLE ATTACK BASED ON EMAIL HIJACKING USING TRY-HYBRID SUPERVISED LEARNING TECHNIQUES." FUDMA JOURNAL OF SCIENCES 9, no. 2 (2025): 66–74. https://doi.org/10.33003/fjs-2025-0902-3062.

Full text
Abstract:
Email communication faces an escalating threat from Man-in-the-Middle (MitM) attacks, which compromise the security and integrity of emails, leading to the risk of data breaches, financial losses, and reputational harm. Traditional email security measures, such as SSL/TLS encryption and authentication protocols (e.g., SPF, DKIM, DMARC), have become increasingly insufficient in countering these advanced MitM attacks. The growing sophistication of MitM techniques, including SSL stripping, DNS spoofing, and session hijacking. This research proposes a countermeasure to MitM attacks based on email hijacking using a try-hybrid supervised learning technique. timestamps, IP addresses, port numbers, packet sizes, and various security-related indicators. The development of the MitM attack detection technique employed a try-hybrid mitm attack detection technique, which combines the strengths of three machine learning algorithms: Random Forest, Gradient Boosting Machine (GBM), and Support Vector Machine (SVM).The results demonstrate the effectiveness of the proposed try-hybrid model, achieving an accuracy of 95.8%, surpassing Benchmark 1 (92.4%) and Benchmark 2 (90.1%). Precision improves to 94.3% compared to Benchmark 1 (91.0%) and Benchmark 2 (88.5%). Similarly, recall is enhanced to 96.5% against Benchmark 1 (89.7%) and Benchmark 2 (87.2%). The F1 score of 95.4% significantly outperforms Benchmark 1 (90.3%) and Benchmark 2 (87.8%). Moreover, the proposed model achieves a lower False Positive Rate (FPR) of 3.2% compared to Benchmark 1 (5.6%) and Benchmark 2 (6.8%).These results highlight the robustness and reliability of the try-hybrid model in enhancing email security by effectively detecting and mitigating advanced MitM attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Beck, Gabrielle, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, and Pratyush Ranjan Tiwari. "Time-Deniable Signatures." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 79–102. http://dx.doi.org/10.56553/popets-2023-0071.

Full text
Abstract:
In this work we propose time-deniable signatures (TDS), a new primitive that facilitates deniable authentication in protocols such as DKIM-signed email. As with traditional signatures, TDS provide strong authenticity for message content, at least {\em for a sender-chosen period of time}. Once this time period has elapsed, however, time-deniable signatures can be forged by any party who obtains a signature. This forgery property ensures that signatures serve a useful authentication purpose for a bounded time period, while also allowing signers to plausibly disavow the creation of older signed content. Most critically, and unlike many past proposals for deniable authentication, TDS do not require interaction with the receiver or the deployment of any persistent cryptographic infrastructure or services beyond the signing process ( e.g., APIs to publish secrets or author timestamp certificates.) We first investigate the security definitions for time-deniability, demonstrating that past definition attempts are insufficient (and indeed, allow for broken signature schemes.) We then propose an efficient construction of TDS based on well-studied assumptions.
APA, Harvard, Vancouver, ISO, and other styles
5

Savya, Savya, R. Mohanraj, K. Sharada, Savya Sachi, K. Neelima, and Punyala Ramadevi. "Securing the Digital Commerce Spectrum and Cyber Security Strategies for Web, E-commerce, M-commerce, and E-mail Security." Journal of Cybersecurity and Information Management 14, no. 1 (2024): 34–49. http://dx.doi.org/10.54216/jcim.140103.

Full text
Abstract:
Secure protection of sensitive data and financial transactions is of the utmost importance in the dynamic world of online trade. In this study, we present a full-stack security architecture that uses five separate algorithms: ECF, Transaction Anomaly Detection, Adaptive Threat Intelligence, Behavioral Biometric Authentication, and Dynamic Encryption Protocol. By creating encryption keys on the fly while the user logs in, the DEP method lays a solid groundwork for safe data transfer. Behavioral biometric authentication (BBA) uses DEP output to verify users based on their distinct behavior, which is an extra layer of security. By combining both current and past threat information, the ATI algorithm is able to constantly adjust security protocols, providing a preventative shield against new dangers. TAD is an expert at detecting anomalies in online purchases, which helps keep financial transactions honest. When ECF and DEP work together, they filter email content, making communication more secure. Flowcharts help to illustrate the interactions between various algorithms, which helps to understand their operations in detail. Every algorithm's importance is brought to light by an ablation study, which shows how each one contributes and how they all work together to affect the overall security posture. The suggested security framework outperforms the state-of-the-art in terms of efficacy, adaptability, and usability, according to performance evaluations conducted using a number of metrics. These findings can help decision-makers build a strong security plan that is specific to the challenges of online shopping. To conclude, the suggested framework is an integrated and complementary strategy that will strengthen online trade in the face of several cyber dangers while simultaneously protecting the confidentiality, authenticity, and availability of all associated communications and transactions.
APA, Harvard, Vancouver, ISO, and other styles
6

Guest, Jodie L., Elizabeth Adam, Iaah L. Lucas, et al. "Methods for Authenticating Participants in Fully Web-Based Mobile App Trials from the iReach Project: Cross-sectional Study." JMIR mHealth and uHealth 9, no. 8 (2021): e28232. http://dx.doi.org/10.2196/28232.

Full text
Abstract:
Background Mobile health apps are important interventions that increase the scale and reach of prevention services, including HIV testing and prevention counseling, pre-exposure prophylaxis, condom distribution, and education, of which all are required to decrease HIV incidence rates. The use of these web-based apps as well as fully web-based intervention trials can be challenged by the need to remove fraudulent or duplicate entries and authenticate unique trial participants before randomization to protect the integrity of the sample and trial results. It is critical to ensure that the data collected through this modality are valid and reliable. Objective The aim of this study is to discuss the electronic and manual authentication strategies for the iReach randomized controlled trial that were used to monitor and prevent fraudulent enrollment. Methods iReach is a randomized controlled trial that focused on same-sex attracted, cisgender males (people assigned male at birth who identify as men) aged 13-18 years in the United States and on enrolling people of color and those in rural communities. The data were evaluated by identifying possible duplications in enrollment, identifying potentially fraudulent or ineligible participants through inconsistencies in the data collected at screening and survey data, and reviewing baseline completion times to avoid enrolling bots and those who did not complete the baseline questionnaire. Electronic systems flagged questionable enrollment. Additional manual reviews included the verification of age, IP addresses, email addresses, social media accounts, and completion times for surveys. Results The electronic and manual strategies, including the integration of social media profiles, resulted in the identification and prevention of 624 cases of potential fraudulent, duplicative, or ineligible enrollment. A total of 79% (493/624) of the potentially fraudulent or ineligible cases were identified through electronic strategies, thereby reducing the burden of manual authentication for most cases. A case study with a scenario, resolution, and authentication strategy response was included. Conclusions As web-based trials are becoming more common, methods for handling suspicious enrollments that compromise data quality have become increasingly important for inclusion in protocols. International Registered Report Identifier (IRRID) RR2-10.2196/10174
APA, Harvard, Vancouver, ISO, and other styles
7

Grindrod, Kelly, Jonathan Boersema, Khrystine Waked, Vivian Smith, Jilan Yang, and Catherine Gebotys. "Locking it down." Canadian Pharmacists Journal / Revue des Pharmaciens du Canada 150, no. 1 (2016): 60–66. http://dx.doi.org/10.1177/1715163516680226.

Full text
Abstract:
Objective: To explore the privacy and security of free medication applications (apps) available to Canadian consumers. Methods: The authors searched the Canadian iTunes store for iOS apps and the Canadian Google Play store for Android apps related to medication use and management. Using an Apple iPad Air 2 and a Google Nexus 7 tablet, 2 reviewers generated a list of apps that met the following inclusion criteria: free, available in English, intended for consumer use and related to medication management. Using a standard data collection form, 2 reviewers independently coded each app for the presence/absence of passwords, the storage of personal health information, a privacy statement, encryption, remote wipe and third-party sharing. A Cohen’s Kappa statistic was used to measure interrater agreement. Results: Of the 184 apps evaluated, 70.1% had no password protection or sign-in system. Personal information, including name, date of birth and gender, was requested by 41.8% (77/184) of apps. Contact information, such as address, phone number and email, was requested by 25% (46/184) of apps. Finally, personal health information, other than medication name, was requested by 89.1% (164/184) of apps. Only 34.2% (63/184) of apps had a privacy policy in place. Conclusion: Most free medication apps offer very limited authentication and privacy protocols. As a result, the onus currently falls on patients to input information in these apps selectively and to be aware of the potential privacy issues. Until more secure systems are built, health care practitioners cannot fully support patients wanting to use such apps.
APA, Harvard, Vancouver, ISO, and other styles
8

Musliyana, Zuhar, Andita Ghaitsa Satira, Mahendar Dwipayana, and Ayu Helinda. "Integrated Email Management System Based Google Application Programming Interface Using OAuth 2.0 Authorization Protocol." Elkawnie 6, no. 1 (2020): 109. http://dx.doi.org/10.22373/ekw.v6i1.5545.

Full text
Abstract:
Abstract : Google Apps is a service provided by Google that allows users to use Google products with their own domain names. Among the products offered by Google Apps are email (Gmail), Docs (Google Drive), and Classroom services. In addition, Google Apps also provides Application Programming Interface (API) services that can be used by developers to take advantage of various features provided by Google. Universitas Ubudiyah Indonesia (UUI) is one of the universities that use Google Apps service for managing student emails. At present, UUI student email management through Google Apps is still not integrated with academic information system data. As a result, UUI must allocate special resources for managing student emails manually. Based on these problems, this study proposes an integration system for UUI student email management using the Google Apps API. This system is designed using PHP programming. The Google Apps API authentication method uses OAuth 2.0. The results of this study indicate that student email management on Google Apps can be done through campus academic information systems. With this system, students can activate email independently without having to be registered manually to the Google Apps page by the campus email managers.Abstrak : Google Apps adalah sebuah layanan yang disediakan oleh Google yang memungkinkan pengguna dapat menggunakan produk google dengan nama domain sendiri. Di antaranya produk yang disediakan Google Apps yaitu layanan email (Gmail), dokumen (Google Drive), dan Classroom. Selain itu, Google Apps juga menyediakan layanan Application Programming Interface (API) yang dapat dimanfaatkan oleh pengembang untuk memanfaatkan berbagai layanan yang disediakan oleh Google. Universitas Ubudiyah Indonesia (UUI) merupakan salah satu universitas yang menggunakan layanan Google Apps untuk pengelolaan email mahasiswa. Saat ini pengelolaan email mahasiswa UUI melalui Google Apps masih belum terintegrasi dengan data sistem informasi akademik. Akibatnya UUI harus mengalokasikan sumber daya khusus untuk mengelola email mahasiswa secara manual. Berdasarkan permasalahan tersebut penelitian ini mengusulkan sistem integrasi pengelolaan email mahasiswa UUI menggunakan API Google Apps. Sistem ini dirancang menggunakan pemograman PHP. Metode autentikasi API Google Apps menggunakan OAuth 2.0. Hasil penelitian ini menunjukkan pengelolaan email mahasiswa pada Google Apps dapat dilakukan melalui sistem informasi akademik kampus. Dengan adanya sistem ini mahasiswa dapat melakukan aktivasi email secara mandiri tanpa harus didaftarkan secara manual ke halaman Google Apps oleh pengelola email kampus.
APA, Harvard, Vancouver, ISO, and other styles
9

Khalifa, Othman, Tengku Hanis Sofea Binti Tengku Nor Effendy, Muhammed Zaharadeen Ahmed, Elmahdi El-Khazmi, and Abdelrahim Nasser Esgiar. "Blockchain Based Email Security to Mitigate Phishing Attack." Asian Journal of Electrical and Electronic Engineering 4, no. 2 (2024): 77–86. https://doi.org/10.69955/ajoeee.2024.v4i2.73.

Full text
Abstract:
Due to the rapid development of research in blockchain technology and cryptocurrencies, all sectors of an economy rely on their security essentials to mitigate various patterns of attack on the Internet. The smart contract is a transaction protocol that strengthens, verifies, and automatically enforces agreements after negotiation between multiple untrustworthy blockchain parties. Despite the positive aspects of smart contracts, issues of security risks, weaknesses, and legal challenges continue to undermine their implementation. This paper proposes an enhanced email verification system using blockchain-enabled smart contracts. In this framework, blockchain email enables swift verification of all emails being transmitted by introducing a challenging framework that prevents an internet attacker or cybercriminal from altering the authentication process. An acknowledgement email will be transmitted to the sender upon successful delivery, and the receiver can automatically receive the email with unique credentials. The findings reveal that the proposed system significantly mitigates phishing attacks by ensuring email authenticity and transaction integrity through blockchain hashing techniques, thereby enhancing email security in both online and offline environments.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Daoming, Qiang Chen, and Lun Wang. "Phishing Attacks: Detection and Prevention Techniques." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 48–53. https://doi.org/10.5281/zenodo.12789572.

Full text
Abstract:
Phishing attacks are among the most prevalent and damaging cyber threats faced by individuals and organizations today. These attacks deceive users into revealing sensitive information, leading to significant financial and reputational damage. This paper explores various techniques for detecting and preventing phishing attacks, examining their effectiveness and implementation challenges. Through comprehensive experiments and analysis, we demonstrate the efficacy of different detection methods and propose best practices for mitigating phishing threats. Our study includes a detailed evaluation of machine learning algorithms, heuristic-based approaches, and user education programs, supported by experimental data and real-world case studies.Our research shows that while machine learning algorithms offer high detection accuracy, they require significant computational resources and continuous updates to remain effective against evolving phishing techniques. Heuristic-based approaches, on the other hand, provide quick detection with lower resource demands but may struggle with new or sophisticated attacks. User education programs are essential for long-term phishing prevention, as they empower users to recognize and avoid phishing attempts, significantly reducing the risk of successful attacks. By combining these methods, organizations can develop a robust defense strategy against phishing threats.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Email Authentication Protocols"

1

Heinlein, Peer. The book of IMAP: Building a mail server with Courier and Cyrus. Open Source Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Email Authentication Protocols"

1

Vazquez Sandoval, Itzel, and Gabriele Lenzini. "A Formal Security Analysis of the $$p\equiv p$$ Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email." In Lecture Notes in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39749-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kaur, Kashish Preet, Sunil K. Singh, Sudhakar Kumar, et al. "Advanced Tools and Technologies for Phishing Prevention." In Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch009.

Full text
Abstract:
Phishing attacks are a major cybersecurity threat, exploiting human vulnerabilities by manipulating trust to access sensitive information. As phishing tactics evolve, the demand for advanced anti-phishing technologies has surged. This paper examines key measures such as email filters, SSL/TLS certificates, DNS-based authentication, multi-factor authentication, and URL filtering to protect against phishing. Advanced methods like machine learning, AI-driven analysis, and real-time threat detection have improved phishing prevention. It also discusses browser-based, cloud-based, and email security tools for mitigating risks. The paper highlights challenges such as evolving tactics, email filtering limitations, and user negligence, emphasizing the need for ongoing innovation in strategies. Future trends like AI, biometrics, and deep learning for threat intelligence are explored, showing potential to enhance phishing defense. A holistic approach integrating technology, protocols, and user awareness is advocated to combat phishing effectively at both individual and organizational levels.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Email Authentication Protocols"

1

Chauhan, Prashant D., and Apurva M. Shah. "Effectiveness of Anti-Spoofing Protocols for Email Authentication." In 2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT). IEEE, 2023. http://dx.doi.org/10.1109/icct56969.2023.10076098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Niehues, Lucas Boppre, and Ricardo Custódio. "Privacy-aware web authentication protocol with recovery and revocation." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19510.

Full text
Abstract:
Password-based authentication is the de facto standard for web services, usually linked to email addresses for account recovery. However, this scheme has several serious known drawbacks. We present a simple pseudonym authentication scheme for users to register and authenticate to online services, by using cryptographic key pairs stored in a mobile device. In contrast to other similar schemes, our proposal requires minimal user interaction, allows for easy account recovery and revocation, and requires no trusted third-party. We created a prototype to evaluate the proposal and concluded that it is viable and has good security, privacy, and usability properties.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography