Affiliation:
1. SRM Institute of Science and Technology
2. SRM University
Abstract
Today's and tomorrow's secret data exchange relies heavily on cryptography. Cryptographic applications offer a secure communication channel for safely transferring data. It provides individuals, groups, and organizations with greater privacy and access to communication and other information, as well as the opportunity to restore personal privacy. Nowadays, online users desire to create an account in order to get access to certain websites, such as online tutorials, online purchases, online resource access, hosting services, social networking sites, and so on. However, unless the service provider or authority person ensures that the registration and login processes are genuine, there is a potential that the account might be hacked by a third party using the ordinary user access method. With the growing usage of cloud emails and frequent reports of large-scale leakage occurrences, a security attribute known as forward secrecy becomes desired and necessary for both users and cloud service providers to improve the security of cloud email systems.
Publisher
Trans Tech Publications Ltd
Reference7 articles.
1. D. Liu and J. Lee, CNN based Malicious Website Detection by Invalidating Multiple Web Spams,, IEEE international conference, vol. 8, no. 1, pp.97258-97266, (2020).
2. Gilchan Park; Julia Rayz, Ontological Detection of Phishing Emails,, IEEE international conference, vol. 7, 8616482, (2018).
3. Jonathan White; Brajendra Panda, Implementing PII honeytokens to mitigate against the threat of malicious insiders, IEEE international conference,vol.7,5137315,(2009).
4. Nafize Ishtiaque Hossain, Ali Reza Galib, Raihan Bin Mofidul A Vision Based Three-Layer Access Management System with IoT Integration , May 2019.
5. Jiawei Zhao, Rahat Masood, Suranga Seneviratne A Review of Computer Vision Methods in Network Security, arXiv:2005.0338,(2020).