Fig 4 - uploaded by Manesh Thankappan
Content may be subject to copyright.
Source publication
In this era of information technology, email applications are the foremost and extensively used electronic communication technology. Emails are profusely used to exchange data and information using several frontend applications from various service providers by its users. Currently most of the email clients and service providers now moved to secure...
Context in source publication
Context 1
... parallel sub segments rearrange the corresponding SMTP and POP3 network sessions based on its sequence number and timestamps intelligently by analyzing duplicate as well as retransmitted network packets. Following section provides an insight into various processes involved packet assembly algorithm as shown in fig 4. www.ijacsa.thesai.org ...
Similar publications
The Kingdom of Saudi Arabia's efforts to enhance the security of its Information and
Communication Technology (ICT), which enables the businesses and residents of Saudi Arabia to carry out their day to day activities with ease and convenience, have been continuously subjected to various types and levels of cyber threats resulting in information and...