Protection Profiles for Remailer Mixes Do the New Evaluation Criteria Help (original) (raw)

Protection Profiles for Remailer Mixes

Kai Rannenberg

Lecture Notes in Computer Science, 2001

View PDFchevron_right

Protection Pro les for Remailer Mixes

Kai Rannenberg

2001

View PDFchevron_right

Natural Privacy Preservation Protocol for Electronic Mail

Christoph Steup, Kim Hartmann

View PDFchevron_right

Data Leakage Prevention: E-Mail Protection via Gateway

Ishu Gupta

Journal of Physics: Conference Series

View PDFchevron_right

taxonomy-of-email-security-protocol.pdf

Abhineet Anand

View PDFchevron_right

Efficiency and Limitation of Secure Protocol in E-Mail Services .

Ijesrt Journal

International Journal of Engineering Sciences & Research Technology, 2012

View PDFchevron_right

Security and Privacy in Emerging Communication Standards

Haibat Khan

2020

View PDFchevron_right

Network Security: Necessary for today's view

Dhavalsinh Solanki

View PDFchevron_right

Security and Privacy in Communication Networks

Joaquin Garcia-Alfaro

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009

View PDFchevron_right

Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007)

Adam Lee

ACM SIGMOD Record, 2008

View PDFchevron_right

Anonymity and Privacy in Electronic Services, IWT APES deliverable 11 Tools for Technologies and Applications of Controlled Anonymity

Svetla Nikova, Vincent Naessens

View PDFchevron_right

Privacy Considerations for Internet Protocols

B. Aboba

2013

View PDFchevron_right

Neither Snow Nor Rain Nor MITM... An Empirical Analysis of Email Delivery Security

vijay eranti

2016

View PDFchevron_right

Study of the Security Enhancements in Various E-Mail Systems

saja alqurashi

Journal of Information Security, 2015

View PDFchevron_right

An user-centric MIX-net protocol to protect privacy

alessandro acquisti

2002

View PDFchevron_right

Comparison Between Two Practical Mix Designs

Len Sassaman

Computer Security–ESORICS 2004, 2004

View PDFchevron_right

IRJET- Mimecast: Cloud Email Security Management

IRJET Journal

IRJET, 2020

View PDFchevron_right

A SECURE EMAIL SYSTEM

Meshack Okongo

View PDFchevron_right

My Email Communications Security Assessment (MECSA): 2018 Results

益 謝

2019

View PDFchevron_right

PriS Methodology: Incorporating Privacy Requirements into the System Design Process

Vagelio Kavakli

5th IEEE International Symposium on Signal Processing and Information Technology, 2005

View PDFchevron_right

Towards a Secure Email Service for The Future Internet

Éric Renault

2012

View PDFchevron_right

Usable secure mailing lists with untrusted servers

Rakesh Bobba

Proceedings of the 8th Symposium on Identity and Trust on the Internet - IDtrust '09, 2009

View PDFchevron_right

Transport Layer Security (TLS), and Secure/Multipurpose Internet Mail

Brian Hibbard

2011

View PDFchevron_right

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SEMESTER -VI LECTURE NOTES CS1355 – CRYPTOGRAPHY AND NETWORK SECURITY PREPARED BY

Dineshraj D

View PDFchevron_right

A REVIEW OF ANONYMOUS COMMUNICATIONS– MIX

Jaydeep Howlader

View PDFchevron_right

IJERT-Fair and Secure Certified Email Protocol

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2013

View PDFchevron_right

IFIP AICT 428-ICT Systems Security and Privacy Protection

Anas Abou El Kalam

2014

View PDFchevron_right

Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services

Steve Kent

1993

View PDFchevron_right