You are in:Home/Publications/Using Trusted Computing in Trusted Mail Transfer Protocol

Dr. Fady Abd Al-Moneim Mohamed :: Publications:

Title:
Using Trusted Computing in Trusted Mail Transfer Protocol
Authors: Fady Mohamed, Elsayed Hemayed
Year: 2014
Keywords: Not Available
Journal: Security and Communication Networks
Volume: 7
Issue: 5
Pages: 926-933
Publisher: Wiley Online Library
Local/International: International
Paper Link:
Full paper Not Available
Supplementary materials Not Available
Abstract:

In this era, hacking techniques have become more dangerous and more widely used across the Internet. If we want to send and receive a trusted email, our current techniques would not be efficient. In this paper, we propose a new protocol for trusting our emails based on Trusted Computing. We combine the hardware-based cryptography of the Trusted Platform Module and the Remote Attestation with the email protocols. The details of the proposed protocol and its security analysis are discussed in this paper.

Google ScholarAcdemia.eduResearch GateLinkedinFacebookTwitterGoogle PlusYoutubeWordpressInstagramMendeleyZoteroEvernoteORCIDScopus