Multi-Destination Secure Electronic Mail
نویسنده
چکیده
this solution has a flaw which in certain circumstances allows the malicious construction of apparently authentic messages. Finally note that it is not the intention of the author to criticise what is after all only an RFC,l but rather to ensure that possible solutions to multi-destination secure message authentication problems are analysed with care. There are many lessons to be learnt from the study of flawed systems which are apparently perfectly secure.
منابع مشابه
Secure Processing and Delivery of Medical Images for Patient Information Protection
In the delivery of medical imaging (such as Xray, MRI) for remote diagnosis, the protection of the security and privacy of patient’s information is extremely important. As conventional E-mail delivery is considered insecure, nowadays, people send medical images to a remote location using secure shared network storage space over IP protocol. While this is more reliable than traditional E-mail de...
متن کاملThe Email Infrastructure in Europe Today
The e-mail service is one of the most used network services: electronic mail messages can now easily be delivered in any place where a network connection exists. However, despite the current multi-media oriented spirit of the other popular services, most of the electronic mail traffic is still plain text. While the transport infrastructure is potentially in place, there is a strong need for coo...
متن کاملExperiences With Secure Electronic Mail
The PASSWORD project provided a pilot secure electronic mail service across Europe. This paper describes some of the lessons we learned.
متن کاملMaking Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols
Code voting was introduced by Chaum as a solution for using a possibly infected-by-malware device to cast a vote in an electronic voting application. Chaum’s work on code voting assumed voting codes are physically delivered to voters using the mail system, implicitly requiring to trust the mail system. This is not necessarily a valid assumption to make especially if the mail system cannot be tr...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Comput. J.
دوره 32 شماره
صفحات -
تاریخ انتشار 1989