Journal articles on the topic 'Security issues behind E-mail'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security issues behind E-mail.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
G, Gopu, and Thangadurai K. "A Study on Security Issues in E-Mail Communication." Shanlax International Journal of Commerce 7, S3 (2019): 90–94. https://doi.org/10.5281/zenodo.2572436.
Full textCR, Rachana. "Data Security in Cloud Computing: A Research Perspective." International Journal of Research and Review 9, no. 11 (2022): 325–30. http://dx.doi.org/10.52403/ijrr.20221144.
Full textVerma, Aanchal N. "Collaborative Security in Wireless Networks and Vulnerabilities Assessment for Fintech E-payment Companies: A Bibliometric Analysis." ADHYAYAN: A JOURNAL OF MANAGEMENT SCIENCES 13, no. 02 (2024): 42–51. http://dx.doi.org/10.21567/adhyayan.v13i2.07.
Full textYogar, Bagaskoro Nur Abu, and Muhammad Akbar Nugraha Sabarna. "Bibliometric Analysis of Research Trends in Data Security and Privacy for E-Government Implementation in Indonesia." Agile Governance and Innovation Measurement Journal 2, no. 1 (2025): 15–25. https://doi.org/10.18196/agimjournal.v2i1.20.
Full textAnwer, Mardin A., Ingo Stengel, and Rina Dinkha Zarro. "User-centered Security for Protecting Patient Privacy for E-health Cloud Computing." Journal of University of Human Development 2, no. 3 (2016): 509. http://dx.doi.org/10.21928/juhd.v2n3y2016.pp509-514.
Full textD. Sandhya rani, Dr.T. Vara Lakshmi, and K. Triveni. "Mobile E-Commerce Evolution an Overview of Online Shopping Trends." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 05 (2024): 1592–95. http://dx.doi.org/10.47392/irjaem.2024.0218.
Full textSolovyanenko, Nina Ivanovna. "Issues of Legal Regulation of the Use of Digital Technologies in Agricultural Business." Сельское хозяйство, no. 3 (March 2020): 46–53. http://dx.doi.org/10.7256/2453-8809.2020.3.35336.
Full textGupta, Sandeep, Attaullah Buriro, and Bruno Crispo. "Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access." Mobile Information Systems 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/2649598.
Full textAsriny, Novendri Isra, Chandra Kusuma Dewa, and Ahmat Luthfi. "Modeling OTP Delivery Notification Status through a Causality Bayesian Network." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 18, no. 1 (2024): 61. http://dx.doi.org/10.22146/ijccs.90030.
Full textReginald, Reginald. "Performance of Procurement System in Ministries and Institutions through Integration of LKPP e-catalogue and LPSE Electronic Procurement System." Eduvest - Journal of Universal Studies 5, no. 1 (2025): 639–54. https://doi.org/10.59188/eduvest.v5i1.50027.
Full textMonakov, D. M., V. A. Shaderkina, S. A. Reva, and A. A. Gritskevich. "Protection of patients' personal data when using telemedicine technologies during the COVID-19 pandemic." Russian Journal of Telemedicine and E-Health 7, no. 4 (2021): 48–57. http://dx.doi.org/10.29188/2712-9217-2021-7-4-48-57.
Full textGhosh Roy, Saikat, and Parijat Upadhyay. "Does e-readiness of citizens ensure better adoption of government’s digital initiatives? A case based study." Journal of Enterprise Information Management 30, no. 1 (2017): 65–81. http://dx.doi.org/10.1108/jeim-01-2016-0001.
Full textBaydarova, Aiset U., Mukhamed K. Tlastankulov, and Murat V. Agayev. "E-COMMERCE INFORMATION SECURITY ISSUES." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 12/13, no. 153 (2024): 60–66. https://doi.org/10.36871/ek.up.p.r.2024.12.13.008.
Full textKumar, Abhishek. "A STUDY ON CUSTOMER AWARENESS ON E- BANKING SERVICES AT UNION BANK OF INDIA, MANGALORE." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32932.
Full textMukhtar, Harun, Daniel Adi Putra Sitorus, and Yulia Fatma. "Analisa Dan Implementasi Security Mail Server." JURNAL FASILKOM 10, no. 1 (2020): 25–32. http://dx.doi.org/10.37859/jf.v10i1.1906.
Full textChen, Lei, Wen-Chen Hu, Ming Yang, and Lei Zhang. "Security and Privacy Issues in Secure E-Mail Standards and Services." International Journal of Information Security and Privacy 3, no. 3 (2009): 1–13. http://dx.doi.org/10.4018/jisp.2009100701.
Full textKnight, W. "Caught in the net [Internet and e-mail security issues]." IEE Review 51, no. 7 (2005): 26–30. http://dx.doi.org/10.1049/ir:20050702.
Full textLee, Chien-Ding, and Tzung-Her Chen. "New Secure and Practical E-Mail Protocol with Perfect Forward Secrecy." Symmetry 13, no. 7 (2021): 1144. http://dx.doi.org/10.3390/sym13071144.
Full textNantz, Karen S., and Cynthia L. Drexel. "Incorporating Electronic Mail into the Business Communication Course." Business Communication Quarterly 58, no. 3 (1995): 45–51. http://dx.doi.org/10.1177/108056999505800309.
Full textLyapicheva, Nina. "Implementation of the Russian antivirus mail gateway in the e-mail system of CEMI RAS." Herald of CEMI 7, no. 2 (2024): 0. http://dx.doi.org/10.33276/s265838870031144-1.
Full textJin, Lei, Hassan Takabi, and James B. D. Joshi. "Analysing security and privacy issues of using e-mail address as identity." International Journal of Information Privacy, Security and Integrity 1, no. 1 (2011): 34. http://dx.doi.org/10.1504/ijipsi.2011.043730.
Full textM, Navaneetha Krishnan, Balaji D, and Mohamed Puhari Anif Y. "Cipher Mail Server for Intranet." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 398–401. http://dx.doi.org/10.22214/ijraset.2022.43743.
Full textMrs., Thanuja V. "Blockchain Technology in Banking - Applications, Challenges, and Security Issues." International Journal of Advance and Applied Research 4, no. 10 (2023): 39–48. https://doi.org/10.5281/zenodo.7820498.
Full textLutsenko, O. "Legal security for employer monitoring of employee use of corporate email, internet resources, and computer technology in the United States of America." Uzhhorod National University Herald. Series: Law 3, no. 75 (2023): 47–54. http://dx.doi.org/10.24144/2307-3322.2022.75.3.8.
Full textOuyang, Qianhe, Jiahe Tian, and Jiale Wei. "E-mail Spam Classification using KNN and Naive Bayes." Highlights in Science, Engineering and Technology 38 (March 16, 2023): 57–63. http://dx.doi.org/10.54097/hset.v38i.5699.
Full textTsvetkova, Marina. "School Course on Information Security: Structure and Content." Profession-Oriented School 8, no. 2 (2020): 47–52. http://dx.doi.org/10.12737/1998-0744-2020-47-52.
Full textCho, Ying-Chiang, and Jen-Yi Pan. "Multiple-Feature Extracting Modules Based Leak Mining System Design." Scientific World Journal 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/704865.
Full textVeleva, Petya. "PERSONAL DATA SECURITY FOR SMART SYSTEMS AND DEVISES WITH REMOTE ACCESS." Trakia Journal of Sciences 17, Suppl.1 (2019): 873–82. http://dx.doi.org/10.15547/tjs.2019.s.01.144.
Full textPervaiz, Hafiz Shahzad, and Shaukat Hussain Bhatti. "Analyses of Cybercrime Regulations Falling behind New Technologies." Winter 2023 3, no. 1 (2023): 460–69. http://dx.doi.org/10.54183/jssr.v3i1.181.
Full textAndrea, Daphne, and Theresa Aurel Tanuwijaya. "Weak State as a Security Threat: Study Case of El Salvador (2014-2019)." Jurnal Sentris 4, no. 1 (2023): 14–33. http://dx.doi.org/10.26593/sentris.v4i1.6545.14-33.
Full textSuriya, Begum* Sujeeth Kumar Ashhar. "A COMPREHENSIVE STUDY ON ETHICAL HACKING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 8 (2016): 214–19. https://doi.org/10.5281/zenodo.59534.
Full textSneps-Sneppe, M., D. Namiot, and R. Pauliks. "Information System Cyber Threats and Telecommunications Engineering Courses." Latvian Journal of Physics and Technical Sciences 57, no. 1-2 (2020): 52–61. http://dx.doi.org/10.2478/lpts-2020-0007.
Full textGoel, Sonia, Anindya Gopal Prusty, Pulkit Bhasin, and Abhishek Kashyap. "Iot Based Home Security System with Live Streaming." International Journal of Advance Research and Innovation 7, no. 3 (2019): 63–67. http://dx.doi.org/10.51976/ijari.731908.
Full textIORDACHE, Dorin. "INTERNET OF THINGS SECURITY FRAMEWORK." STRATEGIES XXI - Security and Defense Faculty 17, no. 1 (2021): 287–93. http://dx.doi.org/10.53477/2668-2001-21-36.
Full textSytnyk, Hanna. "Preliminary assessment of implementing the economic part of the National Security Strategy of Ukraine." Problems and Perspectives in Management 15, no. 4 (2017): 24–37. http://dx.doi.org/10.21511/ppm.15(4).2017.03.
Full textPingala Suthishni D, Nethra, and D. Shanmugapriya. "A Survey on Spoofing and Selective Forwarding Attacks on Zigbee based WSN." Mapana Journal of Sciences 22, Special Issue 2 (2023): 397–419. https://doi.org/10.12723/mjs.sp2.23.
Full textFabbio Carrocini, Maria Vitória, Vinícius Eduardo Ferrari, and Paulo Ricardo Silva Oliveira. "Food security and agricultural markets:." International Journal for Innovation Education and Research 7, no. 8 (2019): 359–66. http://dx.doi.org/10.31686/ijier.vol7.iss8.1690.
Full textNsuangani, Nsele Mengi, and Miguel A. Pérez. "Accessing Web-Based Health Related Information by College Students." Californian Journal of Health Promotion 4, no. 1 (2006): 64–74. http://dx.doi.org/10.32398/cjhp.v4i1.734.
Full textDavydov, S. A. "The Concept of Security in Turkish History and Culture." Concept: philosophy, religion, culture 7, no. 2 (2023): 63–72. http://dx.doi.org/10.24833/2541-8831-2023-2-26-63-72.
Full textKharaishvili, Eter, Paata Koguashvili, and Nino Shengelia. "FROM TRADITIONAL TO “SMART” AGRICULTURE: ADVANTAGES, CHALLENGES AND PROSPECTS OF DIGITIZATION." Innovative economics and management 11, no. 1 (2024): 6–16. http://dx.doi.org/10.46361/2449-2604.11.1.2024.6-16.
Full textMarkov, A. K., P. P. Shmakov, Y. N. Egorov, and E. E. Mozhaev. "STRATEGY OF NATIONAL ECONOMIC SECURITY IN THE LEADING COUNTRIES OF THE WORLD." Scientific Review Theory and Practice 10, no. 12 (2020): 3259–69. http://dx.doi.org/10.35679/2226-0226-2020-10-12-3259-3269.
Full textUtami Dewi, Karina. "Addressing Human Security in Japan’s Foreign Policy Towards the Developing Countries." Global South Review 1, no. 2 (2017): 139. http://dx.doi.org/10.22146/globalsouth.28835.
Full textAl Hosni, Mr Daeij, and Dr M. Firdouse Rahman Khan. "THE EFFECT OF SECURITY PROCEDURES ON EMPLOYEE MORALE." International Journal of Management, Innovation & Entrepreneurial Research 2, no. 2 (2016): 24. http://dx.doi.org/10.18510/ijmier.2016.221.
Full textHu, Getao, Jun Yang, and Jun Li. "The Dynamic Evolution of Global Energy Security and Geopolitical Games: 1995~2019." International Journal of Environmental Research and Public Health 19, no. 21 (2022): 14584. http://dx.doi.org/10.3390/ijerph192114584.
Full textShypovskyi, Volodymyr, Volodymyr Cherneha, and Serhiy Marchenkov. "Analysis of the ways of improvement of Ukraine – NATO cooperation on cybersecurity issues." Journal of Scientific Papers "Social development and Security" 10, no. 2 (2020): 11–15. http://dx.doi.org/10.33445/sds.2020.10.2.2.
Full textAlibayev, Yerlan, and Marina Onuchko. "ENSURING FOOD SECURITY OF KAZAKHSTAN IN THE CONDITIONS OF THE EAEU." Qogam jane Dauir 77, no. 1 (2023): 83–92. http://dx.doi.org/10.52536/2788-5860.2023-1.08.
Full textDillon, Stuart, Florian Stahl, and Gottfried Vossen. "BYOD and Governance of the Personal Cloud." International Journal of Cloud Applications and Computing 5, no. 2 (2015): 23–35. http://dx.doi.org/10.4018/ijcac.2015040102.
Full textDr., R. Rajesh. "A Gamming of CaptchaThe Confrontation Against Captcha with Implementation of the Random Dice with RSA." International Journal of Innovative Science and Research Technology 8, no. 2 (2023): 626–30. https://doi.org/10.5281/zenodo.7668474.
Full textBundala, Ntogwa Ng’habi. "Cybercrime: Psychological Tricks and Computer Securities Challenges." Asian Journal of Research in Computer Science 17, no. 12 (2024): 1–17. https://doi.org/10.9734/ajrcos/2024/v17i12525.
Full textBella, Giampaolo. "What is Correctness of Security Protocols?" JUCS - Journal of Universal Computer Science 14, no. (12) (2008): 2083–106. https://doi.org/10.3217/jucs-014-12-2083.
Full text