Malicious Impostor Email Prevention Using Randomly Encrypted Address Book
Abstract
Keywords
Full Text:
PDFReferences
Rajesh Perumal R, Vinu J, Malicous Impostor Email Prevention Using REAB, ICIRET 2010,August 2010.
Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu -How to Secure Your Email Address Books, CANS'07,February 2008
(Handbook style) Liuis Mora,Neutralbit - SMTP Information gathering Matthew Fisher, Web Application Hacking , SPI Dynamics
(Handbook style) Gray Hat Hacking The Ethical Hacker’s Handbook -Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester
(Handbook style) Gunter Ollmann, Professional Services Director - Passive Information Gathering The Analysis of Leaked Network Security Information
(Handbook style) William Stallings - The RC4 Stream Encryption Algorithm
Dr.Asai Thampi, ISRO, private communication, April 2010.
Wikipedia –Email, Available: http://en.wikipedia.org/wiki/E-mail
Wikipedia–Email Address, Available : http://en.wikipedia.org/wiki/Email_address
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.