Journal articles on the topic 'Secure email'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure email.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Masone, Chris, and Sean Smith. "Towards usefully secure email." IEEE Technology and Society Magazine 26, no. 1 (2007): 25–34. http://dx.doi.org/10.1109/mtas.2007.335563.
Full textBradbury, Danny. "Can we make email secure?" Network Security 2014, no. 3 (March 2014): 13–16. http://dx.doi.org/10.1016/s1353-4858(14)70032-7.
Full textRuoti, Scott, and Kent Seamons. "Johnny's Journey Toward Usable Secure Email." IEEE Security & Privacy 17, no. 6 (November 2019): 72–76. http://dx.doi.org/10.1109/msec.2019.2933683.
Full textsaxena, Komal, and Anjan Saxena. "A Preventive Measure to Secure Your Email on Cloud." Global Journal For Research Analysis 3, no. 3 (June 15, 2012): 15–16. http://dx.doi.org/10.15373/22778160/mar2014/6.
Full textAlSabah, Mashael, Alin Tomescu, Ilia Lebedev, Dimitrios Serpanos, and Srini Devadas. "PriviPK: Certificate-less and secure email communication." Computers & Security 70 (September 2017): 1–15. http://dx.doi.org/10.1016/j.cose.2017.04.008.
Full textSalhi, Dhai Eddine, Abdelkamel Tari, and Mohand Tahar Kechadi. "Email Classification for Forensic Analysis by Information Gain Technique." International Journal of Software Science and Computational Intelligence 13, no. 4 (October 2021): 40–53. http://dx.doi.org/10.4018/ijssci.2021100103.
Full textKapadia, Apu. "A Case (Study) For Usability in Secure Email Communication." IEEE Security and Privacy Magazine 5, no. 2 (March 2007): 80–84. http://dx.doi.org/10.1109/msp.2007.25.
Full textKarlita, Tita. "HILLMAIL: A SECURE EMAIL SYSTEM FOR ANDROID-BASED MOBILE PHONE USING HILL CIPHER ALGORITHM." Kursor 8, no. 3 (March 13, 2017): 141. http://dx.doi.org/10.28961/kursor.v8i3.89.
Full textGu, Chun Ying, and Rui Ying Fang. "Email Security and PGP Technical Analysis." Advanced Materials Research 546-547 (July 2012): 1075–79. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1075.
Full textHeisey-Grove, Dawn M., and Henry J. Carretta. "Disparities in Secure Messaging Uptake Between Patients and Physicians: Longitudinal Analysis of Two National Cross-Sectional Surveys." Journal of Medical Internet Research 22, no. 5 (May 1, 2020): e12611. http://dx.doi.org/10.2196/12611.
Full textThiago Moecke, Cristian, and Melanie Volkamer. "Usable secure email communications: criteria and evaluation of existing approaches." Information Management & Computer Security 21, no. 1 (March 15, 2013): 41–52. http://dx.doi.org/10.1108/09685221311314419.
Full textSOBHY, MOHAMED I., and ALAA-EL-DIN SHEHATA. "SECURE COMPUTER COMMUNICATION USING CHAOTIC ALGORITHMS." International Journal of Bifurcation and Chaos 10, no. 12 (December 2000): 2831–39. http://dx.doi.org/10.1142/s021812740000181x.
Full textSubpratatsavee, Puchong, Chanchira Chintho, and Suchai Tanaiadehawoot. "A Security of Circular Email in Manufacturing." Applied Mechanics and Materials 752-753 (April 2015): 1296–300. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1296.
Full textOjha, Vibha, and Ravinder Singh. "Cryptography for Secure E-mail Communication." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 2 (February 28, 2019): 67–71. http://dx.doi.org/10.17762/ijritcc.v7i2.5341.
Full textCombest, Travis M., Allison Howell, Harjinder Kumar, Samer Koutoubi, Karen Cieslewicz, and Joetta Khan. "Effect of Using an Exercise and Nutrition Secure Email Message on the Implementation of Health Promotion in a Large Health Care System." Californian Journal of Health Promotion 17, no. 2 (December 23, 2019): 62–66. http://dx.doi.org/10.32398/cjhp.v17i2.2290.
Full textPiedrahita Castillo, Diego, Francisco Machío Regidor, Javier Bermejo Higuera, Juan Ramón Bermejo Higuera, and Juan Antonio Sicilia Montalvo. "A New Mail System for Secure Data Transmission in Cyber Physical Systems." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 28, Supp02 (December 2020): 23–48. http://dx.doi.org/10.1142/s0218488520400127.
Full textRutland, Jonathan, Catherine Marie, and Benjamin Rutland. "A system for telephone and secure email consultations, with automatic billing." Journal of Telemedicine and Telecare 10, no. 1_suppl (November 2004): 88–91. http://dx.doi.org/10.1258/1357633042614285.
Full textRuoti, Scott, Jeff Andersen, Luke Dickinson, Scott Heidbrink, Tyler Monson, Mark O'neill, Ken Reese, et al. "A Usability Study of Four Secure Email Tools Using Paired Participants." ACM Transactions on Privacy and Security 22, no. 2 (April 10, 2019): 1–33. http://dx.doi.org/10.1145/3313761.
Full textKim, Hodong, Hyundo Yoon, Youngjoo Shin, and Junbeom Hur. "On the Security of Practical Mail User Agents against Cache Side-Channel Attacks." Applied Sciences 10, no. 11 (May 29, 2020): 3770. http://dx.doi.org/10.3390/app10113770.
Full textLei, Ming Yue, Zheng Huang, Qiao Yan Wen, and Chun Ye Hu. "A Secure Cloud Computing Scaling Model." Applied Mechanics and Materials 411-414 (September 2013): 60–66. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.60.
Full textPalen, Ted E., Di Meng, and Terhilda Garrido. "Categorizing Patient-Provider Secure Email Communications to Measure Substitutionary Effect on In-Person Services." Journal of Patient-Centered Research and Reviews 2, no. 2 (April 30, 2015): 115. http://dx.doi.org/10.17294/2330-0698.1139.
Full textAl-Dwairi, M. O., A. Y. Hendi, and Z. A. AlQadi. "An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images." Engineering, Technology & Applied Science Research 9, no. 3 (June 8, 2019): 4165–68. http://dx.doi.org/10.48084/etasr.2525.
Full textLarkin, James, Ivana Pericin, Brian O'Mahoney, Karina Hull, and Claire Collins. "An Evaluation of a Secure Email Service (Healthmail): A Cross-sectional Survey of Irish GPs." Universal Journal of Public Health 6, no. 5 (September 2018): 284–97. http://dx.doi.org/10.13189/ujph.2018.060507.
Full textWooldridge, Abigail R., Pascale Carayon, Peter Hoonakker, Albert Musa, and Philip Bain. "Technology-Mediated Communication between Patients and Primary Care Clinicians and Staff." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 556–60. http://dx.doi.org/10.1177/1541931213601128.
Full textK M, Meghana, and Manjunath C R. "SURVEY ON DESIGN OF PATIENT BLOOD PRESSURE MONITORING SYSTEM USING SECURE IOT." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 86–90. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3359.
Full textOsliak, Oleksii, Andrea Saracino, and Fabio Martinelli. "A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing." Information & Computer Security 27, no. 5 (November 11, 2019): 687–710. http://dx.doi.org/10.1108/ics-01-2019-0011.
Full textNurani, Dwi. "Perancangan Aplikasi Email Menggunakan Algoritma Caesar CIPHER dan Base64." JISKA (Jurnal Informatika Sunan Kalijaga) 2, no. 3 (March 22, 2018): 175. http://dx.doi.org/10.14421/jiska.2018.23-07.
Full textJohar, Md Gapar Md, Zairina Ibrahim, and Nur Farhana Mohd Hamidi. "Secure Quick Response Based on Dynamic Quick Response Code." Journal of Computational and Theoretical Nanoscience 17, no. 2 (February 1, 2020): 1090–98. http://dx.doi.org/10.1166/jctn.2020.8772.
Full textLee, Joy L., Sydney M. Dy, Steven J. Kravet, Bimal H. Ashar, Todd Nesson, and Albert W. Wu. "Patient satisfaction and provider use of electronic communication: A cross-sectional analysis." European Journal for Person Centered Healthcare 5, no. 4 (December 29, 2017): 441. http://dx.doi.org/10.5750/ejpch.v5i4.1352.
Full textBolsin, Stephen N., Tom Faunce, and Mark Colson. "Using portable digital technology for clinical care and critical incidents: a new model." Australian Health Review 29, no. 3 (2005): 297. http://dx.doi.org/10.1071/ah050297.
Full textBennett, Wendy L., Carolyn T. Bramante, Scott D. Rothenberger, Jennifer L. Kraschnewski, Sharon J. Herring, Michelle R. Lent, Jeanne M. Clark, et al. "Patient Recruitment Into a Multicenter Clinical Cohort Linking Electronic Health Records From 5 Health Systems: Cross-sectional Analysis." Journal of Medical Internet Research 23, no. 5 (May 27, 2021): e24003. http://dx.doi.org/10.2196/24003.
Full textSong, Mingqiu, Penghua Wang, and Peng Yang. "Promotion of secure software development assimilation: stimulating individual motivation." Chinese Management Studies 12, no. 1 (April 3, 2018): 164–83. http://dx.doi.org/10.1108/cms-01-2017-0005.
Full textShahani, Shaun, Pearl Korenblit, Pauline Thomas, Marian R. Passannante, Richard Carr, and Lynn Davis. "Targeted Secure Messages to Facilitate Access to Tobacco Treatment Counseling for Veterans: Feasibility Study." JMIR Mental Health 5, no. 1 (March 5, 2018): e18. http://dx.doi.org/10.2196/mental.7957.
Full textG Rooney, Alasdair, William Hewins, Amie Walker, Lisa Withington, Mairi Mackinnon, Sara Robson, Aimee Green, et al. "INNV-27. BT-LIFE (BRAIN TUMOURS, LIFESTYLE INTERVENTIONS, AND FATIGUE EVALUATION): LESSONS LEARNED FROM RUNNING A NOVEL MULTI-SECTORAL RESEARCH TRIAL." Neuro-Oncology 22, Supplement_2 (November 2020): ii122. http://dx.doi.org/10.1093/neuonc/noaa215.510.
Full textMeng, D., and T. Garrido. "C3-4: Primary Care Physician Efficiency in Handling Patient Secure Email and the Impact on Patient Communication and Access." Clinical Medicine & Research 11, no. 3 (September 1, 2013): 150. http://dx.doi.org/10.3121/cmr.2013.1176.c3-4.
Full textFaruq, Amrul, Khaeruddin Khaeruddin, and Merinda Lestandy. "Sistem Keamanan Multi Mail Server dengan Teknik Enkripsi OPENPGP pada Zimbra Exchange Open Source Software." Jurnal Teknologi Informasi dan Ilmu Komputer 7, no. 3 (May 22, 2020): 493. http://dx.doi.org/10.25126/jtiik.2020731869.
Full textAnandpara, Rahul. "Secured Mail Transformation System Using Machine Learnin." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 20, 2021): 1880–86. http://dx.doi.org/10.22214/ijraset.2021.36764.
Full textRahardja, Untung, Eka Purnama Harahap, and Sarah Pratiwi. "Pemanfaatan Mailchimp Sebagai Trend Penyebaran Informasi Pembayaran Bagi Mahasiswa Di Perguruan Tinggi." Technomedia Journal 2, no. 2 (April 22, 2018): 41–54. http://dx.doi.org/10.33050/tmj.v2i2.323.
Full textAlexander, Anu Sara, and L. C. Manikandan. "A Study on Steganography Concealing Data." European Journal of Engineering Research and Science 4, no. 5 (May 23, 2019): 115–18. http://dx.doi.org/10.24018/ejers.2019.4.5.1337.
Full textMeng, D., T. E. Palen, J. Tsai, M. McLeod, T. Garrido, and H. Qian. "Association between secure patient-clinician email and clinical services utilisation in a US integrated health system: a retrospective cohort study." BMJ Open 5, no. 11 (November 9, 2015): e009557-e009557. http://dx.doi.org/10.1136/bmjopen-2015-009557.
Full textMambelli, Marco, Mirica Yancey, and Thomas Hein. "Archival, anonymization and presentation of HTCondor logs with GlideinMonitor." EPJ Web of Conferences 251 (2021): 02012. http://dx.doi.org/10.1051/epjconf/202125102012.
Full textSchillinger, Dean, Danielle McNamara, Scott Crossley, Courtney Lyles, Howard H. Moffet, Urmimala Sarkar, Nicholas Duran, et al. "The Next Frontier in Communication and the ECLIPPSE Study: Bridging the Linguistic Divide in Secure Messaging." Journal of Diabetes Research 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/1348242.
Full textAlamri, Sultan. "An Efficient Approach for Exchanging Exam Contents in E-Learning Institutions." International Journal of Emerging Technologies in Learning (iJET) 12, no. 11 (November 16, 2017): 83. http://dx.doi.org/10.3991/ijet.v12i11.7180.
Full textS, Murali, Manimaran A, Selvakumar K, and Dinesh Kumar S. "Hashing based Hybrid Online Voting Using Amazon Web Services." International Journal of Engineering & Technology 7, no. 4.10 (October 2, 2018): 295. http://dx.doi.org/10.14419/ijet.v7i4.10.20915.
Full textBaghramyan, R. "An Application of Grice’s Cooperative Principle to the Analysis of a Written Business Negotiation Model." Science and Education a New Dimension IX(253), no. 45 (June 25, 2021): 66–69. http://dx.doi.org/10.31174/send-hs2021-253ix45-02.
Full textJoshi, Sanjaya. "HIPAA, HIPAA, Hooray?: Current Challenges and Initiatives in Health Informatics in the United States." Biomedical Informatics Insights 1 (January 2008): BII.S2007. http://dx.doi.org/10.4137/bii.s2007.
Full textLi, Shuai, and Nicholas Hopper. "Mailet: Instant Social Networking under Censorship." Proceedings on Privacy Enhancing Technologies 2016, no. 2 (April 1, 2016): 175–92. http://dx.doi.org/10.1515/popets-2016-0011.
Full textCampling, Hannah, and Dominic Aubrey-Jones. "On-call handover ‘– if it isn't documented then it didn't happen’." BJPsych Open 7, S1 (June 2021): S177—S178. http://dx.doi.org/10.1192/bjo.2021.483.
Full textArin, Ikrar Adinata, and J. Rolles Herwin Sihombing. "Perancangan Sistem Informasi Rekonsiliasi Transaksi (Bank Xyz)." ComTech: Computer, Mathematics and Engineering Applications 5, no. 1 (June 30, 2014): 311. http://dx.doi.org/10.21512/comtech.v5i1.2627.
Full textTually, Peter, Johan Janssen, Simon Cowell, and John Walker. "A preliminary assessment of Internet-based nuclear telecardiology to support the clinical management of cardiac disease in a remote community." Journal of Telemedicine and Telecare 9, no. 1_suppl (June 2003): 69–71. http://dx.doi.org/10.1258/135763303322196411.
Full text