Draper-Gil et al., 2019 - Google Patents
My email communications security assessment (MECSA): 2018 resultsDraper-Gil et al., 2019
View PDF- Document ID
- 7203968016538915848
- Author
- Draper-Gil G
- Sanchez I
- Publication year
External Links
Snippet
This JRC technical report presents the results obtained by the My Email Communications Security Assessment (MECSA) tool. MECSA is an online 1 tool developed by the Joint Research Centre to assess the security of email communications between email providers; …
- 238000004891 communication 0 abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/06—Message adaptation based on network or terminal capabilities
- H04L51/066—Message adaptation based on network or terminal capabilities with adaptation of format
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5825—Message adaptation based on network or terminal capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/589—Message switching systems, e.g. electronic mail systems unified messaging, e.g. interactions between instant messaging [IM], e-mail or other types of messages such as Converged IP Messaging [CPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5895—Message switching systems, e.g. electronic mail systems in combination with wireless systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/581—Real time or near real time messaging, e.g. instant messaging [IM]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Foster et al. | Security by any other name: On the effectiveness of provider based email security | |
Kucherawy et al. | Domain-based message authentication, reporting, and conformance (DMARC) | |
Goldberg | Privacy-enhancing technologies for the internet III: ten years later | |
Herzberg et al. | Trustbar: Protecting (even naive) web users from spoofing and phishing attacks | |
Prins et al. | Diginotar certificate authority breach “operation black tulip” | |
JP2011501578A (en) | Method and system for indicating the reliability of secure communications | |
Schwittmann et al. | Domain impersonation is feasible: a study of ca domain validation vulnerabilities | |
Van Der Toorn et al. | Addressing the challenges of modern DNS a comprehensive tutorial | |
US20100180121A1 (en) | Method and apparatus for enhancing security in network-based data communication | |
Muftic et al. | Business information exchange system with security, privacy, and anonymity | |
Rose et al. | Trustworthy email | |
Herzberg | DNS-based email sender authentication mechanisms: A critical review | |
Volini | A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues | |
Nightingale | Email authentication mechanisms: DMARC, SPF and DKIM | |
Draper-Gil et al. | My email communications security assessment (MECSA): 2018 results | |
Herzberg et al. | Security and identification indicators for browsers against spoofing and phishing attacks | |
Ragheb et al. | The effectiveness of dkim and spf in strengthening email security | |
van Hove et al. | Your Vulnerability Disclosure Is Important To Us: An Analysis of Coordinated Vulnerability Disclosure Responses Using a Real Security Issue | |
Draper Gil et al. | JRC TECHNICAL REPORT | |
US20240056466A1 (en) | Computerized system for analysis and of electronic communication systems | |
Bergström et al. | Public certificate management: An analysis of policies and practices used by CAs | |
JP2005167967A (en) | Anonymous communication method | |
Kour et al. | Email attacks: Investigation about the vulnerability of the Swedish organizations against email threats. | |
Zhao et al. | An add-on end-to-end secure email solution in mobile communications | |
Nopanen | Enforcing SMTP encryption: Research on current DANE and MTA-STS implementations in Finland |