Academic literature on the topic 'Secure email'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure email.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure email"

1

Masone, Chris, and Sean Smith. "Towards usefully secure email." IEEE Technology and Society Magazine 26, no. 1 (2007): 25–34. http://dx.doi.org/10.1109/mtas.2007.335563.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bradbury, Danny. "Can we make email secure?" Network Security 2014, no. 3 (March 2014): 13–16. http://dx.doi.org/10.1016/s1353-4858(14)70032-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ruoti, Scott, and Kent Seamons. "Johnny's Journey Toward Usable Secure Email." IEEE Security & Privacy 17, no. 6 (November 2019): 72–76. http://dx.doi.org/10.1109/msec.2019.2933683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

saxena, Komal, and Anjan Saxena. "A Preventive Measure to Secure Your Email on Cloud." Global Journal For Research Analysis 3, no. 3 (June 15, 2012): 15–16. http://dx.doi.org/10.15373/22778160/mar2014/6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

AlSabah, Mashael, Alin Tomescu, Ilia Lebedev, Dimitrios Serpanos, and Srini Devadas. "PriviPK: Certificate-less and secure email communication." Computers & Security 70 (September 2017): 1–15. http://dx.doi.org/10.1016/j.cose.2017.04.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Salhi, Dhai Eddine, Abdelkamel Tari, and Mohand Tahar Kechadi. "Email Classification for Forensic Analysis by Information Gain Technique." International Journal of Software Science and Computational Intelligence 13, no. 4 (October 2021): 40–53. http://dx.doi.org/10.4018/ijssci.2021100103.

Full text
Abstract:
One of the most interesting fields nowadays is forensics. This field is based on the works of scientists who study evidence to help the police solve crimes. In the domain of computer science, the crimes within computer forensics are usually network attacks, and most attacks are over the email (the case of this study). Email has become a daily means of communication which is mainly accessible via internet. People receive thousands of emails in their inboxes and mail servers (in which people can find emails in those lists). The aim of this study is to secure email users by building an automatic checking and detecting system on servers to filter the bad emails from the good ones. In this paper, the authors will do a study based on a new method of emails clustering to extract the bad and good ones. The authors use the gain information technique like an algorithm of clustering, whose principle is to calculate the importance of each attribute (in this study, the authors talk about the attributes that constitute the email) to draw the importance tree and at the end extract the clusters.
APA, Harvard, Vancouver, ISO, and other styles
7

Kapadia, Apu. "A Case (Study) For Usability in Secure Email Communication." IEEE Security and Privacy Magazine 5, no. 2 (March 2007): 80–84. http://dx.doi.org/10.1109/msp.2007.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Karlita, Tita. "HILLMAIL: A SECURE EMAIL SYSTEM FOR ANDROID-BASED MOBILE PHONE USING HILL CIPHER ALGORITHM." Kursor 8, no. 3 (March 13, 2017): 141. http://dx.doi.org/10.28961/kursor.v8i3.89.

Full text
Abstract:
Nowadays, email has become the most widely communication way in daily life. Email is a very important method of communicating across the internet. During transmission and downloads, it uses protocols which are not secure. Spammers and scammers misuse these protocols to gain access to critical data stored in the email. This triggered concerns because sometimes email is used to exchange confidential messages. To improve security and efficiency of email system, we made an email security system for Android mobile phone using Hill Cipher algorithm. Hill Cipher is a classic cryptography algorithm that uses matrix inverse and matrix multiplication operations to hide the message. The initial stage of the encryption process is forming ciphertext by multiplying the key matrix with plaintext matrix. The contents of encrypted messages only can be read by legitimate recipient who has the key. Converting the ciphertext into plaintext is done by multiplying the ciphertext matrix with the inverse key matrix. The email content can be a plain message or a message with an attached file.
APA, Harvard, Vancouver, ISO, and other styles
9

Gu, Chun Ying, and Rui Ying Fang. "Email Security and PGP Technical Analysis." Advanced Materials Research 546-547 (July 2012): 1075–79. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1075.

Full text
Abstract:
Currently, Email is one of the most popular applications in people’s life. A secure email requires that the email system can provide encryption and digital signature, PGP is a popular email encryption and transmission method, the paper gives a brief overview of email security, details the PGP algorithm, function, encryption and decryption process and public/private key pair generation process, and analysis’s Security of PGP.
APA, Harvard, Vancouver, ISO, and other styles
10

Heisey-Grove, Dawn M., and Henry J. Carretta. "Disparities in Secure Messaging Uptake Between Patients and Physicians: Longitudinal Analysis of Two National Cross-Sectional Surveys." Journal of Medical Internet Research 22, no. 5 (May 1, 2020): e12611. http://dx.doi.org/10.2196/12611.

Full text
Abstract:
Background Emails securely exchanged between patients and clinicians offer the promise of improved access to care and indirectly improved health outcomes. Yet research to date is mixed on who—among both patients and clinicians—is using secure messaging. Objective Using data from two large nationally representative cross-sectional surveys, this study aimed to compare the prevalence of secure messaging use among patients and their access to the functionality through their physicians, and to explore the clinical practice and physician characteristics and patient sociodemographic characteristics associated with the use of secure messaging. Methods We conducted regression analyses to identity statistical associations between self-reported secure messaging use and access, and the patient, practice, and physician characteristics from the National Health Interview Survey (NHIS) and the National Ambulatory Medical Care Survey (NAMCS). The NHIS data collected between 2013 and 2018, with approximately 150,000 adult individuals, were used to evaluate patient characteristics associated with email communication with clinicians. The NAMCS data included 7340 physicians who reported on secure messaging use between 2013 and 2016 and provided context on physician specialty, use of certified health information technology (IT), and practice size and ownership associated with secure messaging access and use. Results By 2016, two-thirds of ambulatory care visits were conducted by a physician who reported using secure messaging, up from 40.70% in 2013. The percentage of US residents who reported sending an email to their clinician, however, only increased from 7.22% to 16.67% between 2013 and 2018. We observed a strong positive association between certified health IT use and secure messaging use (odds ratio [OR] 11.46, 95% CI 7.55-17.39). Individuals who were black, had lower levels of education, had Medicaid or other public payer insurance, or those who were uninsured had reduced odds for using email to communicate with clinicians. No differences were observed in secure messaging use based on physician specialty, but significant differences were observed by practice size (OR 0.46, 95% CI 0.35-0.60 in solo practices vs nonsolo practices) and practice ownership (P<.001 for the different categories). Conclusions This study is the first to use two large nationally representative surveys to produce longitudinal estimates on the access and use of patient-clinician email communication in the United States. The survey findings complement each other: one provides the patient perspective of their use and the other indicates potential patient access to secure messaging based on the use of the functionality by the physicians providing treatment. This study provides nationally representative data on the characteristics of patients and physicians who have access to and are using secure messaging. This information can be used to target interventions to promote adoption and use of secure messaging.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Secure email"

1

Jaliwala, Shabbir Hussain. "Unspoofed a secure email system /." Diss., Online access via UMI:, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Segeberg, Ryan B. "EASEmail: Easy Accessible Secure Email." BYU ScholarsArchive, 2009. https://scholarsarchive.byu.edu/etd/2135.

Full text
Abstract:
Traditional email encryption methods are difficult to set up, as they require senders to obtain a message recipient's public key before a secure communication can be sent. Easy Accessible Secure Email (EASEmail) addresses the key establishment and exchange issues of encrypted email by using a lightweight symmetric key server. Users can send a secure email without establishing or exchanging keys with the recipient in advance. With usability as its primary goal, EASEmail strives to bring usable secure email communication to the masses.
APA, Harvard, Vancouver, ISO, and other styles
3

Liao, Lijun. "Secure email communication with XML-based technologies." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/1000311201/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Monson, Tyler Jay. "Usable Secure Email Through Short-Lived Keys." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6568.

Full text
Abstract:
Participants from recent secure email user studies have expressed a need to use secure email tools only a few times a year. At the same time, Internet users are expressing concerns over the permanence of personal information on the Internet. Support for short-lived keys has the potential to address both of these problems. However, the short-lived keys usability and security space is underdeveloped and unexplored. In this thesis, we present an exploration of the short-lived keys usability and security design space. We implement both a short-lived keys and a long-term keys secure email prototype. With these two prototypes, we conduct a within-subjects user study. Results from our study show that participants believe the short-lived keys prototype is more secure and more trusted. Participants also provide feedback on what they want in a system supporting short-lived keys. They also discuss how concerned they are about the permanence of their information on the Internet and on their devices.
APA, Harvard, Vancouver, ISO, and other styles
5

Deng, Ni. "A secure, payment-based email delivery system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rideout, Ariel Lauren. "An email spam filtering proxy using secure authentication and micro-bonds." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33348.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.
Includes bibliographical references (p. 71-74).
The Apuma system described in this thesis was designed and implemented as a novel combination of existing technologies in order to give an email user full control over their incoming email. The innate uncertainty of automatic spam detection creates a tension between the desire to filter 100% of spam, and the need to avoid the loss of legitimate mail. Apuma attempts to solve this problem by combining accept-lists with payment systems and content evaluation. Messages from known senders can be exempted from filtering; combined with intelligent automated management of the accept-list this can eliminate the vast majority of false-positives. Remaining mail can thus be subjected to much more rigorous screening. Finally, first time contact and other special cases can be handled with micro-payments or micro-bonds. Apuma includes a plugin interface that allows any financial, proof-of work, or other desired protocol to be integrated into the Apuma filtering framework.
by Ariel Lauren Rideout.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
7

Andersen, Jeffrey Thomas. "The Quest to Secure Email: A Usability Analysis of Key Management Alternatives." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6461.

Full text
Abstract:
The current state of email security is lacking, and the need for end-to-end encryption of email is clear. Recent research has begun to make progress towards usable, secure email for the masses (i.e., novice users without IT support). In this paper, we evaluate the usability implications of three different key management approaches: PGP, IBE, and passwords. Our work is the first formal A/B evaluation of the usability of different key management schemes, and the largest formal evaluation of secure email ever performed. Our results reveal interesting inherent usability trade-offs for each approach to secure email. Furthermore, our research results in the first fully-implemented PGP-based secure email system that has been shown to be usable for novice users. We share qualitative feedback from participants that provides valuable insights into user attitudes regarding each key management approach and secure email generally. Finally, our work provides an important validation of methodology and design principles described in prior work.
APA, Harvard, Vancouver, ISO, and other styles
8

Burgon, Benjamin W. "Pwm: A Secure Webmail System Designed for Easy Adoption." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/3896.

Full text
Abstract:
None of the three largest webmail service providers (serving over 1 billion users) support end-to-end message encryption. Encrypted email has never seen mass adoption because it is prohibitive for non-experts to use. Private WebMail (Pwm) is our extension to popular webmail systems that lets users easily encrypt sensitive messages without having to first contact the recipient and share information. It is designed to spread quickly in a grassroots fashion so that a user receiving their first encrypted message can quickly and easily start using the system. This thesis describes the design and implementation of Pwm, then measures its usability through analysis and a user study.
APA, Harvard, Vancouver, ISO, and other styles
9

Bian, Song. "Realizing Homomorphic Secure Protocols through Cross-Layer Design Techniques." Kyoto University, 2019. http://hdl.handle.net/2433/242926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ruoti, Scott. "Usable, Secure Content-Based Encryption on the Web." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6083.

Full text
Abstract:
Users share private information on the web through a variety of applications, such as email, instant messaging, social media, and document sharing. Unfortunately, recent revelations have shown that not only is users' data at risk from hackers and malicious insiders, but also from government surveillance. This state of affairs motivates the need for users to be able to encrypt their online data.In this dissertation, we explore how to help users encrypt their online data, with a special focus on securing email. First, we explore the design principles that are necessary to create usable, secure email. As part of this exploration, we conduct eight usability studies of eleven different secure email tools including a total of 347 participants. Second, we develop a novel, paired-participant methodology that allows us to test whether a given secure email system can be adopted in a grassroots fashion. Third, we apply our discovered design principles to PGP-based secure email, and demonstrate that these principles are sufficient to create the first PGP-based system that is usable by novices. We have also begun applying the lessons learned from our secure email research more generally to content-based encryption on the web. As part of this effort, we develop MessageGuard, a platform for accelerating research into usable, content-based encryption. Using MessageGuard, we build and evaluate Private Facebook Chat (PFC), a secure instant messaging system that integrates with Facebook Chat. Results from our usability analysis of PFC provided initial evidence that our design principles are also important components to usable, content-based encryption on the Web.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Secure email"

1

Håland, Karthon. I frihet og fare: Historien om Marta og Emil Vigdel. Oslo: Luther, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Phishing Exposed. Syngress, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Secure email"

1

Orman, Hilarie. "Using Secure Email." In Encrypted Email, 59–77. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Orman, Hilarie. "Introduction: What Is Secure Email?" In Encrypted Email, 1–7. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Orman, Hilarie. "How Does Secure Email Work?" In Encrypted Email, 33–57. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Orman, Hilarie. "A Brief History of Secure Email." In Encrypted Email, 9–32. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reuter, Adrian, Karima Boudaoud, Marco Winckler, Ahmed Abdelmaksoud, and Wadie Lemrazzeq. "Secure Email - A Usability Study." In Financial Cryptography and Data Security, 36–46. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54455-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Piedrahita, Diego, Javier Bermejo, and Francisco Machío. "A Secure Email Solution Based on Blockchain." In Blockchain and Applications, 355–58. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86162-9_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Dan, and Shiu-Kai Chin. "Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol." In FM’99 — Formal Methods, 758–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48119-2_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Bochuan. "Secure Distributed Storage Based on Public Email System." In Proceedings of the 9th International Symposium on Linear Drives for Industry Applications, Volume 4, 135–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40640-9_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ferreira, Lucas, and Junia Anacleto. "Usability in Solutions of Secure Email – A Tools Review." In Human Aspects of Information Security, Privacy and Trust, 57–73. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Haridas, Deepthi, Rakesh Shukla, Hari Om Prakash, Phani Bhushan Rallapalli, Venkataraman Sarma, V. Raghu Venkatraman, Harshal Shah, and Harshul Vaishnav. "QSecret-Sharing Scheme (QSS)-Based Keyless: Titanium Secure (TitaniumSec) EMail Application." In First International Conference on Sustainable Technologies for Computational Intelligence, 311–21. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0029-9_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secure email"

1

Om, Khandu. "Secure email gateway." In 2017 IEEE International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM). IEEE, 2017. http://dx.doi.org/10.1109/icstm.2017.8089126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Choukse, Dharmendra, Umesh Kumar Singh, Lokesh Laddhani, and Rekha Shahapurkar. "Designing secure email infrastructure." In 2012 Ninth International Conference on Wireless and Optical Communications Networks - (WOCN). IEEE, 2012. http://dx.doi.org/10.1109/wocn.2012.6335534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lausch, Joscha, Oliver Wiese, and Volker Roth. "What is a Secure Email?" In European Workshop on Usable Security. Reston, VA: Internet Society, 2017. http://dx.doi.org/10.14722/eurousec.2017.23022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liyanage, Geethapriya, and Shantha Fernando. "A comprehensive secure email transfer model." In 2017 IEEE International Conference on Industrial and Information Systems (ICIIS). IEEE, 2017. http://dx.doi.org/10.1109/iciinfs.2017.8300341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aviv, Adam J., Michael E. Locasto, Shaya Potter, and Angelos D. Keromytis. "SSARES: Secure Searchable Automated Remote Email Storage." In Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). IEEE, 2007. http://dx.doi.org/10.1109/acsac.2007.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Aviv, Adam J., Michael E. Locasto, Shaya Potter, and Angelos D. Keromytis. "SSARES: Secure Searchable Automated Remote Email Storage." In Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). IEEE, 2007. http://dx.doi.org/10.1109/acsac.2007.4412983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wiegel, Burkhard. "Secure external references in multimedia email messages." In the 3rd ACM conference. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/238168.238179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mar, Kheng Kok, and Yong Law Chee. "Secure Email Attachment as a Service (SeaS)." In 2015 International Conference on Cloud Computing Research and Innovation (ICCCRI). IEEE, 2015. http://dx.doi.org/10.1109/icccri.2015.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Monson, Tyler, Joshua Reynolds, Trevor Smith, Scott Ruoti, Daniel Zappala, and Kent Seamons. "A Usability Study of Secure Email Deletion." In European Workshop on Usable Security. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/eurousec.2018.23018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Madi, Nadim K. M., Solmaz Salehian, Farzaneh Masoumiyan, and Azizol Abdullah. "Implementation of secure email server in cloud environment." In 2012 International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2012. http://dx.doi.org/10.1109/iccce.2012.6271146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography