Articles with "email" as a keyword



Photo from archive.org

Replacing email protocols with blockchain-based smart contracts

Sign Up to like & get
recommendations!
Published in 2020 at "Cluster Computing"

DOI: 10.1007/s10586-020-03128-9

Abstract: Email services nowadays are flooded by spam and phishing attacks. Email service providers build their own email filters to protect the final users from such attacks resulting in an overall better experience. However, the attacks… read more here.

Keywords: based smart; blockchain based; email; protocols blockchain ... See more keywords
Photo by lucasgwendt from unsplash

Seeing the Forest through the Trees

Sign Up to like & get
recommendations!
Published in 2019 at "Political Analysis"

DOI: 10.1017/pan.2018.45

Abstract: 1 Georgia Institute of Technology, Sam Nunn School of International Affairs, Atlanta, GA 30332, USA. Email: [email protected] 2 Arizona State University—School of Politics and Global Studies, Tempe, AZ 85287, USA. Email: [email protected] 3 Arizona State… read more here.

Keywords: forest trees; email; edu; usa email ... See more keywords
Photo by headwayio from unsplash

Enhanced Communication for Interhospital Transfers Increases Preparedness in an Academic Tertiary Care Center.

Sign Up to like & get
recommendations!
Published in 2022 at "Applied clinical informatics"

DOI: 10.1055/s-0042-1756371

Abstract: OBJECTIVES  This quality improvement project sought to enhance clinical information sharing for interhospital transfers to an inpatient hepatology service comprised of internal medicine resident frontline providers (housestaff) with the specific aims of making housestaff aware… read more here.

Keywords: enhanced communication; clinical information; access clinical; interhospital transfers ... See more keywords
Photo by goumbik from unsplash

You can trust me: a multimethod analysis of the Nigerian email scam

Sign Up to like & get
recommendations!
Published in 2018 at "Security Journal"

DOI: 10.1057/s41284-017-0095-0

Abstract: How do scammers invoke trust within the Nigerian email scam and how do recipients interpret such trust-laden offers? Rather than view the email content as static, this article suggests that the emails strategically appeal to… read more here.

Keywords: analysis; email; trust; nigerian email ... See more keywords
Photo from wikipedia

A systematic review of email-based reminder interventions to increase vaccine uptake

Sign Up to like & get
recommendations!
Published in 2019 at "European Journal of Public Health"

DOI: 10.1093/eurpub/ckz186.519

Abstract: Reminder and recall interventions have been proven to be effective in increasing vaccination coverage. Emails are a popular mean of communication, and their use as a reminder method has many potential benefits: low costs, timely… read more here.

Keywords: email; review; vaccine uptake; email reminders ... See more keywords
Photo from wikipedia

Phone Administration of the Western Ontario Shoulder Instability Index Is More Reliable Than Administration via Email

Sign Up to like & get
recommendations!
Published in 2022 at "Clinical Orthopaedics and Related Research"

DOI: 10.1097/corr.0000000000002320

Abstract: Abstract Background The Western Ontario Shoulder Instability (WOSI) questionnaire is a 21-item questionnaire to evaluate quality of life in patients with shoulder instability. Completing the questionnaire is time-consuming because each item is evaluated on a… read more here.

Keywords: administration; shoulder; telephone; original wosi ... See more keywords
Photo by charlesdeluvio from unsplash

A Comprehensive Survey for Intelligent Spam Email Detection

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2954791

Abstract: The tremendously growing problem of phishing e-mail, also known as spam including spear phishing or spam borne malware, has demanded a need for reliable intelligent anti-spam e-mail filters. This survey paper describes a focused literature… read more here.

Keywords: spam; email; spam email; intelligent spam ... See more keywords
Photo from wikipedia

An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-Policy Attribute-Based Encryption With Keyword Search

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2021.3136331

Abstract: With the rapid growth of cloud email services, email encryption is beginning to be used more and more to alleviate concerns about cloud privacy and security. However, this increase in usage invites the problem of… read more here.

Keywords: encryption; scheme; policy; email ... See more keywords
Photo by homajob from unsplash

Understanding Account Recovery in the Wild and its Security Implications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2020.2975789

Abstract: Account recovery (usually through a password reset) on many websites has mainly relied on accessibility to a registered email, due to its favorable deployability and usability. However, it makes a user's online accounts vulnerable to… read more here.

Keywords: account recovery; security; email; password recovery ... See more keywords
Photo by charlesdeluvio from unsplash

Indonesian language email spam detection using N-gram and Naïve Bayes algorithm

Sign Up to like & get
recommendations!
Published in 2020 at "Bulletin of Electrical Engineering and Informatics"

DOI: 10.11591/eei.v9i5.2444

Abstract: Indonesia is ranked the top 8th out of the total country population in the world for the global spammers. Web-based spam filter service with the REST API type can be used to detect email spam… read more here.

Keywords: email spam; spam; email; indonesian language ... See more keywords
Photo from wikipedia

Exploring the role of strategy instruction on learners’ ability to write authentic email requests to faculty

Sign Up to like & get
recommendations!
Published in 2022 at "Language Teaching Research"

DOI: 10.1177/13621688211066997

Abstract: This study used a pre-test post-test research design to investigate the role of explicit strategy instruction on Spanish English as a foreign language (EFL) learners’ ability to write authentic email requests to faculty. Drawing on… read more here.

Keywords: strategy instruction; learners ability; email; email requests ... See more keywords