You are in:Home/Publications/Using Trusted Computing in Trusted Mail Transfer Protocol | |
Dr. Fady Abd Al-Moneim Mohamed :: Publications: |
Title: | Using Trusted Computing in Trusted Mail Transfer Protocol |
Authors: | Fady Mohamed, Elsayed Hemayed |
Year: | 2014 |
Keywords: | Not Available |
Journal: | Security and Communication Networks |
Volume: | 7 |
Issue: | 5 |
Pages: | 926-933 |
Publisher: | Wiley Online Library |
Local/International: | International |
Paper Link: | |
Full paper | Not Available |
Supplementary materials | Not Available |
Abstract: |
In this era, hacking techniques have become more dangerous and more widely used across the Internet. If we want to send and receive a trusted email, our current techniques would not be efficient. In this paper, we propose a new protocol for trusting our emails based on Trusted Computing. We combine the hardware-based cryptography of the Trusted Platform Module and the Remote Attestation with the email protocols. The details of the proposed protocol and its security analysis are discussed in this paper. |