Kent, 1993 - Google Patents
Internet privacy enhanced mailKent, 1993
View PDF- Document ID
- 6459203714166827908
- Author
- Kent S
- Publication year
- Publication venue
- Communications of the ACM
External Links
Snippet
INTERNET PRIVACY ENHANCED MAlL he primary focus of the effort to develop and deploy Internet Privacy Enhanced Mail (PEM) is the provision of security for email users in the Internet community. The PEM effort began in 1985 as an activity of the Privacy and Security …
- 230000000694 effects 0 abstract description 3
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kent | Internet privacy enhanced mail | |
| US7493661B2 (en) | Secure transmission system | |
| US6904521B1 (en) | Non-repudiation of e-mail messages | |
| US7644268B2 (en) | Automated electronic messaging encryption system | |
| US7325127B2 (en) | Security server system | |
| US9509681B2 (en) | Secure instant messaging system | |
| US7475256B2 (en) | Secure message forwarding system detecting user's preferences including security preferences | |
| US7277549B2 (en) | System for implementing business processes using key server events | |
| US20070174636A1 (en) | Methods, systems, and apparatus for encrypting e-mail | |
| CN113508563A (en) | Block chain based secure email system | |
| US20050039019A1 (en) | Method and system for authenticating a message sender using domain keys | |
| US20040151323A1 (en) | Implementing nonrepudiation and audit using authentication assertions and key servers | |
| US20030046533A1 (en) | Secure E-mail system | |
| US20070288746A1 (en) | Method of providing key containers | |
| Orman | Encrypted Email: The History and Technology of Message Privacy | |
| Turner et al. | Implementing email and security tokens: current standards, tools, and practices | |
| US20070079114A1 (en) | Method and system for the communication of a message as well as a suitable key generator for this | |
| Landau et al. | Cryptography in Public: A Brief History | |
| Ayla | Trusted Mail Gateway | |
| Moser | S/MIME | |
| Kent | Internet Privacy Enhanced Mail | |
| Schmied | Security Mechanisms for EDI over the Internet | |
| Al-Hammadi | Certified exchange of electronic mail (CEEM): A nonrepudiation protocol to protect both originator and recipient | |
| Russell et al. | Cryptography (From Julius Caesar Through Public Key Cryptosystems) Methods to Keep Secrets Secret | |
| Mitchell et al. | The Security Architecture of the Secure Mobile Messaging Demonstrator |