Approaches for Securing Email Authentication Process – A Review
Abstract: Email, sometimes written as e mail, is simply the reduced form of "electronic mail� a system for receiving, sending, and holding electronic messages. It has gained practically universal acceptance around the world with the spread of the World Wide Web. In many cases, email has become the preferred method for both personal and business communication. Consequently, improve the security provision in necessary to maintain integrity and confidentiality of data. Passwords are by far the most used and the most conveniently subverted method of personal authentication. If a business institutes policies to guarantee secure passwords (such since frequently changed alphanumeric upper/lower case combo of by least 10 characters) the inconvenience is so high that such an plan will probably be broken in an overwhelming amount of instances.
Keywords: Handshaking Protocol, OTP, Captcha, Visual Cryptography.
How to Cite:
[1] Shananda Dey, Ms. Jharna Chopra, “Approaches for Securing Email Authentication Process – A Review,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2016.54159
