Sciweavers

3 search results - page 1 / 1
» Certified email with a light on-line trusted third party: de...
Sort
View
WWW
2002
ACM
14 years 11 months ago
Certified email with a light on-line trusted third party: design and implementation
This paper presents a new protocol for certified email. The protocol aims to combine security, scalability, easy implementation, and viable deployment. The protocol relies on a li...
Martín Abadi, Neal Glew
AINA
2007
IEEE
14 years 2 months ago
A Certified Email Protocol Using Key Chains
This paper introduces an asynchronous optimistic certified email protocol, with stateless recipients, that relies on key chains to considerably reduce the storage requirements of t...
Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mau...
ICETE
2004
253views Business» more  ICETE 2004»
14 years 8 days ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong