Mail client with data transfer protected with end-to-end encryption
نویسندگان
چکیده
This article is devoted to the study of issues secure messaging and file exchange by e-mail at enterprises agro-industrial complex. The purpose this work develop an algorithmic support software mail client that supports functionality end-to-end data encryption. following research methods are used in article: comparison method, observation structural analysis method. method identify differences between key distribution protocols. Methods make it possible understand behavior various protocols within systems differ technical properties. consists four parts: Introduction, Materials Methods, Results, Conclusions. first part describes relevance topic, discusses features cryptographic second developed algorithms ensure operation third results implementation algorithms. In fourth conclusions made summed up. main for local architecture based on use symmetric cryptography; a tool designed according scheme, including modules allow you system client-server architecture.
منابع مشابه
Comparison of nerve repair with end to end, end to side with window and end to side without window methods in lower extremity of rat
Abstract Background : Although, different studies on end-to-side nerve repair, results are controversial. The importance of this method in case is unavailability of proximal nerve. In this method, donor nerves also remain intact and without injury. In compare to other classic procedures, end-to-side repair is not much time consuming and needs less dissection. Overall, the previous studies i...
متن کاملSTEED — Usable End-to-End Encryption
End-to-end e-mail encryption is still ignored by almost all users. The mails are left in the clear in the mailboxes of the web mail providers, where they are frequently collected by attackers and lead to an escalation of the attack due to the sensitivity of the mail content. We suggest a new and simplified infrastructure to protect mail that is compatible with OpenPGP and S/MIME and relies on a...
متن کاملFault Identification using end-to-end data by imperialist competitive algorithm
Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...
متن کاملFault Identification using end-to-end data by imperialist competitive algorithm
Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: E3S web of conferences
سال: 2022
ISSN: ['2555-0403', '2267-1242']
DOI: https://doi.org/10.1051/e3sconf/202236303003