Security and Privacy Risks of Using E-mail Address as an Identity.
Lei JinHassan TakabiJames B. D. JoshiPublished in: SocialCom/PASSAT (2010)
Keyphrases
- identity management
- information security
- intrusion detection
- spam filtering
- security requirements
- biometric data
- security problems
- access control
- security policies
- security protocols
- security properties
- network security
- security threats
- control system
- database
- cyber security
- instant messaging
- individual privacy