[go: up one dir, main page]

Kent, 1993 - Google Patents

Internet privacy enhanced mail

Kent, 1993

View PDF
Document ID
6459203714166827908
Author
Kent S
Publication year
Publication venue
Communications of the ACM

External Links

Snippet

INTERNET PRIVACY ENHANCED MAlL he primary focus of the effort to develop and deploy Internet Privacy Enhanced Mail (PEM) is the provision of security for email users in the Internet community. The PEM effort began in 1985 as an activity of the Privacy and Security …
Continue reading at dl.acm.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Kent Internet privacy enhanced mail
US7493661B2 (en) Secure transmission system
US6904521B1 (en) Non-repudiation of e-mail messages
US7644268B2 (en) Automated electronic messaging encryption system
US7325127B2 (en) Security server system
US9509681B2 (en) Secure instant messaging system
US7475256B2 (en) Secure message forwarding system detecting user's preferences including security preferences
US7277549B2 (en) System for implementing business processes using key server events
US20070174636A1 (en) Methods, systems, and apparatus for encrypting e-mail
CN113508563A (en) Block chain based secure email system
US20050039019A1 (en) Method and system for authenticating a message sender using domain keys
US20040151323A1 (en) Implementing nonrepudiation and audit using authentication assertions and key servers
US20030046533A1 (en) Secure E-mail system
US20070288746A1 (en) Method of providing key containers
Orman Encrypted Email: The History and Technology of Message Privacy
Turner et al. Implementing email and security tokens: current standards, tools, and practices
US20070079114A1 (en) Method and system for the communication of a message as well as a suitable key generator for this
Landau et al. Cryptography in Public: A Brief History
Ayla Trusted Mail Gateway
Moser S/MIME
Kent Internet Privacy Enhanced Mail
Schmied Security Mechanisms for EDI over the Internet
Al-Hammadi Certified exchange of electronic mail (CEEM): A nonrepudiation protocol to protect both originator and recipient
Russell et al. Cryptography (From Julius Caesar Through Public Key Cryptosystems) Methods to Keep Secrets Secret
Mitchell et al. The Security Architecture of the Secure Mobile Messaging Demonstrator