Multi-Destination Secure Electronic Mail

نویسنده

  • Chris J. Mitchell
چکیده

this solution has a flaw which in certain circumstances allows the malicious construction of apparently authentic messages. Finally note that it is not the intention of the author to criticise what is after all only an RFC,l but rather to ensure that possible solutions to multi-destination secure message authentication problems are analysed with care. There are many lessons to be learnt from the study of flawed systems which are apparently perfectly secure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Processing and Delivery of Medical Images for Patient Information Protection

In the delivery of medical imaging (such as Xray, MRI) for remote diagnosis, the protection of the security and privacy of patient’s information is extremely important. As conventional E-mail delivery is considered insecure, nowadays, people send medical images to a remote location using secure shared network storage space over IP protocol. While this is more reliable than traditional E-mail de...

متن کامل

The Email Infrastructure in Europe Today

The e-mail service is one of the most used network services: electronic mail messages can now easily be delivered in any place where a network connection exists. However, despite the current multi-media oriented spirit of the other popular services, most of the electronic mail traffic is still plain text. While the transport infrastructure is potentially in place, there is a strong need for coo...

متن کامل

Experiences With Secure Electronic Mail

The PASSWORD project provided a pilot secure electronic mail service across Europe. This paper describes some of the lessons we learned.

متن کامل

Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols

Code voting was introduced by Chaum as a solution for using a possibly infected-by-malware device to cast a vote in an electronic voting application. Chaum’s work on code voting assumed voting codes are physically delivered to voters using the mail system, implicitly requiring to trust the mail system. This is not necessarily a valid assumption to make especially if the mail system cannot be tr...

متن کامل

Convertible limited (multi-) verifier signature: new constructions and applications

A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Comput. J.

دوره 32  شماره 

صفحات  -

تاریخ انتشار 1989