Sciweavers

Share
43 search results - page 1 / 9
» A Certified Email Protocol Using Key Chains
Sort
View
AINA
2007
IEEE
12 years 3 months ago
A Certified Email Protocol Using Key Chains
This paper introduces an asynchronous optimistic certified email protocol, with stateless recipients, that relies on key chains to considerably reduce the storage requirements of t...
Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mau...
ACSAC
1998
IEEE
12 years 4 months ago
A Certified E-Mail Protocol
Protocols to facilitate secure electronic delivery are necessary if the Internet is to achieve its true potential as a business communications tool. We present a protocol for secu...
Bruce Schneier, James Riordan
CCS
2006
ACM
12 years 3 months ago
Certified mailing lists
Email List Services (or simply, mailing lists) are becoming increasingly common for collaborative computing. In order to enable their use for official purposes with increased effe...
Himanshu Khurana, Hyung-Seok Hahm
CORR
2010
Springer
117views Education» more  CORR 2010»
11 years 11 months ago
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabil...
Mohsen Toorani
CEAS
2008
Springer
12 years 1 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
books