How to secure your email address book and beyond

被引:0
|
作者
Kartaltepe, Ethan J. [1 ]
Parker, T. Paul [1 ]
Xu, Shouhuai [1 ]
机构
[1] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
来源
CRYPTOLOGY AND NETWORK SECURITY | 2007年 / 4856卷
关键词
self-spreading malicious emails; self-replicating malicious emails; email address book; encryption;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Email viruses (or worms) have become a severe threat to the business utility of email systems. In spite of existing countermeasures such as email virus scanners, many people (including the authors) constantly receive suspicious emails. Most, if not all, email viruses proliferate by exploiting the email address books on the infected hosts, simply because the address books are not protected by any means whatsoever. In this paper we explore a novel method to protect email systems, based on appropriately encrypting the email addresses in the email address books and email boxes (or folders). To our knowledge, this work is the first to investigate robust methods for protecting email addresses. We have implemented two prototype systems based on our method, one for a cell phone platform and the other for a desktop platform. Simulation study shows that our method is effective, even if only some users deployed our mechanisms.
引用
收藏
页码:228 / 246
页数:19
相关论文
共 17 条
  • [1] Secure Email Gateway
    Om, Khandu
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2017, : 49 - 53
  • [2] Open PGP based Secure Web Email
    Shukla, Rakesh
    Prakash, Hari Om
    Phanihhusan, R.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 735 - 738
  • [3] PriviPK: Certificate-less and secure email communication
    AlSabah, Mashael
    Tomescu, Alin
    Lebedev, Ilia
    Serpanos, Dimitrios
    Devadas, Srini
    COMPUTERS & SECURITY, 2017, 70 : 1 - 15
  • [4] SAHASTRADHARA: BIOMETRIC AND ETOKEN INTEGRATED SECURE EMAIL SYSTEM
    Shukla, Rakesh
    Prakash, Hari Om
    Bhushan, R. Phani
    Venkataraman, S.
    Varadan, Geeta
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES (ICACT), 2013,
  • [5] Private Webmail 2.0: Simple and Easy-to-Use Secure Email
    Ruoti, Scott
    Andersen, Jeff
    Hendershot, Travis
    Zappala, Daniel
    Seamons, Kent
    UIST 2016: PROCEEDINGS OF THE 29TH ANNUAL SYMPOSIUM ON USER INTERFACE SOFTWARE AND TECHNOLOGY, 2016, : 461 - 472
  • [6] Design of Secure and Independent Controllable Email System Based on Identity-Based Cryptography
    Xuan, Jiaxing
    Wang, Dong
    Li, Zhiqi
    Zhang, Shuxian
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 217 - 222
  • [7] Hybrid Algorithm using Rivest-Shamir-Adleman and Elliptic Curve Cryptography for Secure Email Communication
    Assa-Agyei, Kwame
    Owa, Kayode
    Al-Hadhrami, Tawfik
    Olajide, Funminiyi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (04) : 1037 - 1047
  • [8] POEX: A beyond-birthday-bound-secure on-line cipher
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (01): : 177 - 193
  • [9] Secure Data Quiry Using Unique Hash Indexing Utilizing MAC Address in a Remote Data Storage
    Kaabneh, Khalid
    Alhwaidi, Rakan
    2019 INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2019, : 32 - 37
  • [10] EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
    Cogliati, Benoit
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 121 - 149