Theme-Logo
  • Login
  • Home
  • Course
  • Publication
  • Theses
  • Reports
  • Published books
  • Workshops / Conferences
  • Supervised PhD
  • Supervised MSc
  • Supervised projects
  • Education
  • Language skills
  • Positions
  • Memberships and awards
  • Committees
  • Experience
  • Scientific activites
  • In links
  • Outgoinglinks
  • News
  • Gallery
publication name Using Trusted Computing in Trusted Mail Transfer Protocol
Authors Fady Mohamed, Elsayed Hemayed
year 2014
keywords
journal Security and Communication Networks
volume 7
issue 5
pages 926-933
publisher Wiley Online Library
Local/International International
Paper Link https://onlinelibrary.wiley.com/doi/full/10.1002/sec.804
Full paper download
Supplementary materials Not Available
Abstract

In this era, hacking techniques have become more dangerous and more widely used across the Internet. If we want to send and receive a trusted email, our current techniques would not be efficient. In this paper, we propose a new protocol for trusting our emails based on Trusted Computing. We combine the hardware-based cryptography of the Trusted Platform Module and the Remote Attestation with the email protocols. The details of the proposed protocol and its security analysis are discussed in this paper.

Benha University © 2023 Designed and developed by portal team - Benha University