| publication name | Using Trusted Computing in Trusted Mail Transfer Protocol |
|---|---|
| Authors | Fady Mohamed, Elsayed Hemayed |
| year | 2014 |
| keywords | |
| journal | Security and Communication Networks |
| volume | 7 |
| issue | 5 |
| pages | 926-933 |
| publisher | Wiley Online Library |
| Local/International | International |
| Paper Link | https://onlinelibrary.wiley.com/doi/full/10.1002/sec.804 |
| Full paper | download |
| Supplementary materials | Not Available |
Abstract
In this era, hacking techniques have become more dangerous and more widely used across the Internet. If we want to send and receive a trusted email, our current techniques would not be efficient. In this paper, we propose a new protocol for trusting our emails based on Trusted Computing. We combine the hardware-based cryptography of the Trusted Platform Module and the Remote Attestation with the email protocols. The details of the proposed protocol and its security analysis are discussed in this paper.