Academic literature on the topic 'Secure email'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure email.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure email"
Masone, Chris, and Sean Smith. "Towards usefully secure email." IEEE Technology and Society Magazine 26, no. 1 (2007): 25–34. http://dx.doi.org/10.1109/mtas.2007.335563.
Full textBradbury, Danny. "Can we make email secure?" Network Security 2014, no. 3 (March 2014): 13–16. http://dx.doi.org/10.1016/s1353-4858(14)70032-7.
Full textRuoti, Scott, and Kent Seamons. "Johnny's Journey Toward Usable Secure Email." IEEE Security & Privacy 17, no. 6 (November 2019): 72–76. http://dx.doi.org/10.1109/msec.2019.2933683.
Full textsaxena, Komal, and Anjan Saxena. "A Preventive Measure to Secure Your Email on Cloud." Global Journal For Research Analysis 3, no. 3 (June 15, 2012): 15–16. http://dx.doi.org/10.15373/22778160/mar2014/6.
Full textAlSabah, Mashael, Alin Tomescu, Ilia Lebedev, Dimitrios Serpanos, and Srini Devadas. "PriviPK: Certificate-less and secure email communication." Computers & Security 70 (September 2017): 1–15. http://dx.doi.org/10.1016/j.cose.2017.04.008.
Full textSalhi, Dhai Eddine, Abdelkamel Tari, and Mohand Tahar Kechadi. "Email Classification for Forensic Analysis by Information Gain Technique." International Journal of Software Science and Computational Intelligence 13, no. 4 (October 2021): 40–53. http://dx.doi.org/10.4018/ijssci.2021100103.
Full textKapadia, Apu. "A Case (Study) For Usability in Secure Email Communication." IEEE Security and Privacy Magazine 5, no. 2 (March 2007): 80–84. http://dx.doi.org/10.1109/msp.2007.25.
Full textKarlita, Tita. "HILLMAIL: A SECURE EMAIL SYSTEM FOR ANDROID-BASED MOBILE PHONE USING HILL CIPHER ALGORITHM." Kursor 8, no. 3 (March 13, 2017): 141. http://dx.doi.org/10.28961/kursor.v8i3.89.
Full textGu, Chun Ying, and Rui Ying Fang. "Email Security and PGP Technical Analysis." Advanced Materials Research 546-547 (July 2012): 1075–79. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1075.
Full textHeisey-Grove, Dawn M., and Henry J. Carretta. "Disparities in Secure Messaging Uptake Between Patients and Physicians: Longitudinal Analysis of Two National Cross-Sectional Surveys." Journal of Medical Internet Research 22, no. 5 (May 1, 2020): e12611. http://dx.doi.org/10.2196/12611.
Full textDissertations / Theses on the topic "Secure email"
Jaliwala, Shabbir Hussain. "Unspoofed a secure email system /." Diss., Online access via UMI:, 2006.
Find full textSegeberg, Ryan B. "EASEmail: Easy Accessible Secure Email." BYU ScholarsArchive, 2009. https://scholarsarchive.byu.edu/etd/2135.
Full textLiao, Lijun. "Secure email communication with XML-based technologies." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/1000311201/04.
Full textMonson, Tyler Jay. "Usable Secure Email Through Short-Lived Keys." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6568.
Full textDeng, Ni. "A secure, payment-based email delivery system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2909.
Full textRideout, Ariel Lauren. "An email spam filtering proxy using secure authentication and micro-bonds." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33348.
Full textIncludes bibliographical references (p. 71-74).
The Apuma system described in this thesis was designed and implemented as a novel combination of existing technologies in order to give an email user full control over their incoming email. The innate uncertainty of automatic spam detection creates a tension between the desire to filter 100% of spam, and the need to avoid the loss of legitimate mail. Apuma attempts to solve this problem by combining accept-lists with payment systems and content evaluation. Messages from known senders can be exempted from filtering; combined with intelligent automated management of the accept-list this can eliminate the vast majority of false-positives. Remaining mail can thus be subjected to much more rigorous screening. Finally, first time contact and other special cases can be handled with micro-payments or micro-bonds. Apuma includes a plugin interface that allows any financial, proof-of work, or other desired protocol to be integrated into the Apuma filtering framework.
by Ariel Lauren Rideout.
M.Eng.
Andersen, Jeffrey Thomas. "The Quest to Secure Email: A Usability Analysis of Key Management Alternatives." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6461.
Full textBurgon, Benjamin W. "Pwm: A Secure Webmail System Designed for Easy Adoption." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/3896.
Full textBian, Song. "Realizing Homomorphic Secure Protocols through Cross-Layer Design Techniques." Kyoto University, 2019. http://hdl.handle.net/2433/242926.
Full textRuoti, Scott. "Usable, Secure Content-Based Encryption on the Web." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6083.
Full textBooks on the topic "Secure email"
Håland, Karthon. I frihet og fare: Historien om Marta og Emil Vigdel. Oslo: Luther, 1985.
Find full textBook chapters on the topic "Secure email"
Orman, Hilarie. "Using Secure Email." In Encrypted Email, 59–77. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_4.
Full textOrman, Hilarie. "Introduction: What Is Secure Email?" In Encrypted Email, 1–7. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_1.
Full textOrman, Hilarie. "How Does Secure Email Work?" In Encrypted Email, 33–57. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_3.
Full textOrman, Hilarie. "A Brief History of Secure Email." In Encrypted Email, 9–32. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_2.
Full textReuter, Adrian, Karima Boudaoud, Marco Winckler, Ahmed Abdelmaksoud, and Wadie Lemrazzeq. "Secure Email - A Usability Study." In Financial Cryptography and Data Security, 36–46. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54455-3_3.
Full textPiedrahita, Diego, Javier Bermejo, and Francisco Machío. "A Secure Email Solution Based on Blockchain." In Blockchain and Applications, 355–58. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86162-9_36.
Full textZhou, Dan, and Shiu-Kai Chin. "Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol." In FM’99 — Formal Methods, 758–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48119-2_42.
Full textYang, Bochuan. "Secure Distributed Storage Based on Public Email System." In Proceedings of the 9th International Symposium on Linear Drives for Industry Applications, Volume 4, 135–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40640-9_18.
Full textFerreira, Lucas, and Junia Anacleto. "Usability in Solutions of Secure Email – A Tools Review." In Human Aspects of Information Security, Privacy and Trust, 57–73. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_5.
Full textHaridas, Deepthi, Rakesh Shukla, Hari Om Prakash, Phani Bhushan Rallapalli, Venkataraman Sarma, V. Raghu Venkatraman, Harshal Shah, and Harshul Vaishnav. "QSecret-Sharing Scheme (QSS)-Based Keyless: Titanium Secure (TitaniumSec) EMail Application." In First International Conference on Sustainable Technologies for Computational Intelligence, 311–21. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0029-9_25.
Full textConference papers on the topic "Secure email"
Om, Khandu. "Secure email gateway." In 2017 IEEE International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM). IEEE, 2017. http://dx.doi.org/10.1109/icstm.2017.8089126.
Full textChoukse, Dharmendra, Umesh Kumar Singh, Lokesh Laddhani, and Rekha Shahapurkar. "Designing secure email infrastructure." In 2012 Ninth International Conference on Wireless and Optical Communications Networks - (WOCN). IEEE, 2012. http://dx.doi.org/10.1109/wocn.2012.6335534.
Full textLausch, Joscha, Oliver Wiese, and Volker Roth. "What is a Secure Email?" In European Workshop on Usable Security. Reston, VA: Internet Society, 2017. http://dx.doi.org/10.14722/eurousec.2017.23022.
Full textLiyanage, Geethapriya, and Shantha Fernando. "A comprehensive secure email transfer model." In 2017 IEEE International Conference on Industrial and Information Systems (ICIIS). IEEE, 2017. http://dx.doi.org/10.1109/iciinfs.2017.8300341.
Full textAviv, Adam J., Michael E. Locasto, Shaya Potter, and Angelos D. Keromytis. "SSARES: Secure Searchable Automated Remote Email Storage." In Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). IEEE, 2007. http://dx.doi.org/10.1109/acsac.2007.30.
Full textAviv, Adam J., Michael E. Locasto, Shaya Potter, and Angelos D. Keromytis. "SSARES: Secure Searchable Automated Remote Email Storage." In Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). IEEE, 2007. http://dx.doi.org/10.1109/acsac.2007.4412983.
Full textWiegel, Burkhard. "Secure external references in multimedia email messages." In the 3rd ACM conference. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/238168.238179.
Full textMar, Kheng Kok, and Yong Law Chee. "Secure Email Attachment as a Service (SeaS)." In 2015 International Conference on Cloud Computing Research and Innovation (ICCCRI). IEEE, 2015. http://dx.doi.org/10.1109/icccri.2015.33.
Full textMonson, Tyler, Joshua Reynolds, Trevor Smith, Scott Ruoti, Daniel Zappala, and Kent Seamons. "A Usability Study of Secure Email Deletion." In European Workshop on Usable Security. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/eurousec.2018.23018.
Full textMadi, Nadim K. M., Solmaz Salehian, Farzaneh Masoumiyan, and Azizol Abdullah. "Implementation of secure email server in cloud environment." In 2012 International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2012. http://dx.doi.org/10.1109/iccce.2012.6271146.
Full text