Reference Hub1
Enhancing Security at Email End Point: A Feasible Task for Fingerprint Identification System

Enhancing Security at Email End Point: A Feasible Task for Fingerprint Identification System

Babak Sokouti, Massoud Sokouti
ISBN13: 9781466640306|ISBN10: 1466640308|EISBN13: 9781466640313
DOI: 10.4018/978-1-4666-4030-6.ch015
Cite Chapter Cite Chapter

MLA

Sokouti, Babak, and Massoud Sokouti. "Enhancing Security at Email End Point: A Feasible Task for Fingerprint Identification System." Theory and Practice of Cryptography Solutions for Secure Information Systems, edited by Atilla Elçi, et al., IGI Global, 2013, pp. 361-404. https://doi.org/10.4018/978-1-4666-4030-6.ch015

APA

Sokouti, B. & Sokouti, M. (2013). Enhancing Security at Email End Point: A Feasible Task for Fingerprint Identification System. In A. Elçi, J. Pieprzyk, A. Chefranov, M. Orgun, H. Wang, & R. Shankaran (Eds.), Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 361-404). IGI Global. https://doi.org/10.4018/978-1-4666-4030-6.ch015

Chicago

Sokouti, Babak, and Massoud Sokouti. "Enhancing Security at Email End Point: A Feasible Task for Fingerprint Identification System." In Theory and Practice of Cryptography Solutions for Secure Information Systems, edited by Atilla Elçi, et al., 361-404. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-4030-6.ch015

Export Reference

Mendeley
Favorite

Abstract

Although email security needs more attention, a small amount of research has been conducted. Most of the security properties that can be applied to the email messages are based on encryption and digital signatures. The cryptography techniques that can be both symmetric and asymmetric algorithms cannot prove the identity of the sender and receiver in the real world, which is related to the end point security. Additionally, these techniques are not capable of preventing the spams, scams, and spoofing attacks. A new secure email system based on fingerprint identification is proposed to overcome the recognition of the real identity of the email sender and receiver. This method uses the user’s username and password hashes, their full name and personal image, and fingerprint hashes along with the email message hash. The proposed method is successfully evaluated against security, maintenance, operational, and privacy issues.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.