| You are in:Home/Publications/Using Trusted Computing in Trusted Mail Transfer Protocol | |
Dr. Fady Abd Al-Moneim Mohamed :: Publications: |
|
| Title: | Using Trusted Computing in Trusted Mail Transfer Protocol |
| Authors: | Fady Mohamed, Elsayed Hemayed |
| Year: | 2014 |
| Keywords: | Not Available |
| Journal: | Security and Communication Networks |
| Volume: | 7 |
| Issue: | 5 |
| Pages: | 926-933 |
| Publisher: | Wiley Online Library |
| Local/International: | International |
| Paper Link: | |
| Full paper | Not Available |
| Supplementary materials | Not Available |
| Abstract: |
In this era, hacking techniques have become more dangerous and more widely used across the Internet. If we want to send and receive a trusted email, our current techniques would not be efficient. In this paper, we propose a new protocol for trusting our emails based on Trusted Computing. We combine the hardware-based cryptography of the Trusted Platform Module and the Remote Attestation with the email protocols. The details of the proposed protocol and its security analysis are discussed in this paper. |














