Downloads: 113 | Views: 272 | Monthly Hits: ⮙1
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.2 / 10
IoT Data Access via Email System using POP3 Protocol
Snehal P. Wadibhasme, Nalini A. Mhetre
Abstract: Internet of Things (IoT) is the set of technologies enabling the interconnection of objects by uniquely identifying them in the network. These objects can be provided with sensors/actuators and can easily make information available or perform complex actions. For connecting these things, we need a common platform for communication. Email system can play a vital role when we want secure communication in the world of IoT. Communication between email servers and clients are governed by email protocols. Four important protocols used in email communication are IMAP, POP3, SMTP and HTTP. This paper will focus on POP3 which is designed to support offline/local email processing. Email is delivered to a mail server and a remote email client regularly downloads the email from the server to the user's computer. Once the messages are delivered, they are deleted from the mail server, although users can configure their email client to leave a copy of the email on the mail server.
Keywords: IoT, Webmail, POP3, IMAP, SMTP, HTTP
Edition: Volume 5 Issue 6, June 2016
Pages: 1992 - 1996
DOI: https://www.doi.org/10.21275/NOV164712
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Masters Thesis, Computer Science & Engineering, India, Volume 12 Issue 4, April 2023
Pages: 1324 - 1330A Thesis on News Recommendation
Abhik Naskar, Sudeshna Sarkar
Downloads: 100
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 878 - 881Detection of Malicious Client based HTTP/DoS Attack on Web Server
Dhanya Jayan, Pretty Babu
Downloads: 103
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1628 - 1631A Survey On XML-Injection Attack Detection Systems
Swati Ramesh Kesharwani, Aarti Deshpande
Downloads: 104
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2982 - 2984Protection of Server from Proxy Based HTTP Attacks
Poonam Uttam Patil, Y. V. Chavan
Downloads: 107
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1887 - 1991Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network
Rawendra Pratap Singh, Savita Shiwani