[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Draper-Gil et al., 2019 - Google Patents

My email communications security assessment (MECSA): 2018 results

Draper-Gil et al., 2019

View PDF
Document ID
7203968016538915848
Author
Draper-Gil G
Sanchez I
Publication year

External Links

Snippet

This JRC technical report presents the results obtained by the My Email Communications Security Assessment (MECSA) tool. MECSA is an online 1 tool developed by the Joint Research Centre to assess the security of email communications between email providers; …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/06Message adaptation based on network or terminal capabilities
    • H04L51/066Message adaptation based on network or terminal capabilities with adaptation of format
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5825Message adaptation based on network or terminal capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/589Message switching systems, e.g. electronic mail systems unified messaging, e.g. interactions between instant messaging [IM], e-mail or other types of messages such as Converged IP Messaging [CPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5895Message switching systems, e.g. electronic mail systems in combination with wireless systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/581Real time or near real time messaging, e.g. instant messaging [IM]

Similar Documents

Publication Publication Date Title
Foster et al. Security by any other name: On the effectiveness of provider based email security
Kucherawy et al. Domain-based message authentication, reporting, and conformance (DMARC)
Goldberg Privacy-enhancing technologies for the internet III: ten years later
Herzberg et al. Trustbar: Protecting (even naive) web users from spoofing and phishing attacks
Prins et al. Diginotar certificate authority breach “operation black tulip”
JP2011501578A (en) Method and system for indicating the reliability of secure communications
Schwittmann et al. Domain impersonation is feasible: a study of ca domain validation vulnerabilities
Van Der Toorn et al. Addressing the challenges of modern DNS a comprehensive tutorial
US20100180121A1 (en) Method and apparatus for enhancing security in network-based data communication
Muftic et al. Business information exchange system with security, privacy, and anonymity
Rose et al. Trustworthy email
Herzberg DNS-based email sender authentication mechanisms: A critical review
Volini A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues
Nightingale Email authentication mechanisms: DMARC, SPF and DKIM
Draper-Gil et al. My email communications security assessment (MECSA): 2018 results
Herzberg et al. Security and identification indicators for browsers against spoofing and phishing attacks
Ragheb et al. The effectiveness of dkim and spf in strengthening email security
van Hove et al. Your Vulnerability Disclosure Is Important To Us: An Analysis of Coordinated Vulnerability Disclosure Responses Using a Real Security Issue
Draper Gil et al. JRC TECHNICAL REPORT
US20240056466A1 (en) Computerized system for analysis and of electronic communication systems
Bergström et al. Public certificate management: An analysis of policies and practices used by CAs
JP2005167967A (en) Anonymous communication method
Kour et al. Email attacks: Investigation about the vulnerability of the Swedish organizations against email threats.
Zhao et al. An add-on end-to-end secure email solution in mobile communications
Nopanen Enforcing SMTP encryption: Research on current DANE and MTA-STS implementations in Finland