Advertisement

E-Mail Client Multiplatform for the Transfer of Information Using the SMTP Java Protocol Without Access to a Browser

  • Liliana Enciso
  • Ruben Baez
  • Alvaro Maldonado
  • Elmer Zelaya-Policarpo
  • Pablo Alejandro Quezada-Sarmiento
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 745)

Abstract

At present, the use of emails has increased significantly. Today is one of the easiest and fastest forms of asynchronous communication, especially over long distances, in a convenient and secure way. This document details aspects of communication through Internet access, in order to show a simpler to traditional application, along with the SMTP protocol, an email transfer protocol, it consists of a client- server, which shows the sending of emails to different email addresses at the same time, application which was designed in Java programming language, this allows the client to be multiplatform, using the NetBeans ID, in addition to this, account with the use of different libraries including javax, where the results were to transmit information, with and without attachments, sending such information to 3 different mails at the same time, to interact between different mail servers, reliably, in addition to this provides a user-friendly interface, allowing effective communication.

Keywords

Java NetBeans SMTP Protocol Javax Software 

References

  1. 1.
    Khanji, S., Jabir, R., Ahmad, L., Alfandi, O., Said, H.: Evaluation of Linux SMTP server security aspects??? a case study. In: 2016 7th International Conference on Information and Communication Systems (ICICS), pp. 252–257. IEEE (2016)Google Scholar
  2. 2.
    Lin, S.C., Wen, C.Y., Sethares, W.A.: Two-tier device-based authentication protocol against PUEA attacks for IoT applications. IEEE Trans. Signal Inf. Process. Over Netw. PP(99), 1 (2017)Google Scholar
  3. 3.
    Babrahem, A.S., Alharbi, E.T., Alshiky, A.M., Alqurashi, S.S., Kar, J., et al.: Study of the security enhancements in various e-mail systems. J. Inf. Secur. 6(01), 1 (2014)Google Scholar
  4. 4.
    Zadgaonkar, A., Kashyap, S., Patel, M.C.: Developing a model to detect e-mail address spoofing using biometrics technique. Int. J. Sci. Mod. Eng. (IJISME) (2013). ISSN: 2319–6386Google Scholar
  5. 5.
    Fiebig, T., Lichtblau, F., Streibelt, F., Krueger, T., Lexis, P., Bush, R., Feldmann, A.: Sok: an analysis of protocol design: avoiding traps for implementation and deployment. arXiv preprint arXiv:1610.05531 (2016)
  6. 6.
    Enciso, L., Pachar, J., Palacios, C., Zelaya, E., Pablo, Q.: Instant messaging application (MI-UTPL). In: 2017 7th International Workshop on Computer Science and Engineering, WCSE 2017, pp. 762–766 (2017). www.scopus.com
  7. 7.
    Hui, X., Qingde, H.: The research on hopping covert channel technique based on multi-protocol. DEStech Trans. Eng. Technol. Res. (2016). ICMITE 2016Google Scholar
  8. 8.
    Kim, E.J., Park, J.D.: A study on a new method of sending an e-mail with an attachment using a wireless terminal. In: 9th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), pp. 23–27. IEEE (2014)Google Scholar
  9. 9.
    Goel, U., Shah, K., Singh, S., Qadeer, M.A.: EMS: the talking mail service. In: 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 622–626. IEEE (2011)Google Scholar
  10. 10.
    Santamaría Bernales, L.H.: Implementación de una solución para evitar la pérdida de información en el uso de correos electrónicos corporativos (2014)Google Scholar
  11. 11.
    Lv, F., Xie, X., Zhang, C., Cheng, X.: Research and development of e-mail program based on Java. In: Proceedings of the 3rd International Conference on Anti-Counterfeiting, Security, and Identification in Communication, pp. 80–84. IEEE Press (2009)Google Scholar
  12. 12.
    Quispe, L.E., Galan, L.M.: Assessment of throughput performance under NS2 in mobile ad hoc networks (manets). In: 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, pp. 338–343, June 2013Google Scholar
  13. 13.
    Quispe, L., Galan, L.: Analysis of GOS parameter in AODV a DSR in mobile ad hoc networks, pp. 276–279 (2012), https://www.scopus.com/inward/record.uri?eid=2-s2.0-84864877085&partnerID=40&md5=1ec5278a97247faad90850155c87cb05
  14. 14.
    Mooloo, D., Fowdur, T.: An SSL-based client-oriented anti-spoofing email application. In: AFRICON 2013, pp. 1–5. IEEE (2013)Google Scholar
  15. 15.
    Fowdur, T., Veerasoo, L.: An email application with active spoof monitoring and control. In: 2016 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–6. IEEE (2016)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Liliana Enciso
    • 1
    • 2
  • Ruben Baez
    • 2
  • Alvaro Maldonado
    • 2
  • Elmer Zelaya-Policarpo
    • 2
  • Pablo Alejandro Quezada-Sarmiento
    • 1
    • 3
  1. 1.Grupo Investigación IoT - Network Communications on Smart EnvironmentUniversidad Técnica Particular de LojaLojaEcuador
  2. 2.Departamento de Ciencias de la Computación y ElectrónicaUniversidad Técnica Particular de LojaLojaEcuador
  3. 3.Escuela de Informática y MultimediaUniversidad Internacional del EcuadorQuitoEcuador

Personalised recommendations