Analysis and improvement of a certified e-mail protocol

被引:2
|
作者
Gao, Yue-Xiang [1 ,2 ]
Peng, Dai-Yuan [1 ]
Yan, Li-Li [1 ,3 ]
机构
[1] Information Security and National Computing Grid Laboratory, Southwest Jiaotong University, Chengdu 610031, China
[2] College of Computer Science, Sichuan Normal University, Chengdu 610068, China
[3] Department of Network Engineering, Chengdu University of Information Technology, Chengdu 610225, China
关键词
13;
D O I
10.3969/j.issn.1001-0548.2013.02.023
中图分类号
学科分类号
摘要
引用
收藏
页码:300 / 305
相关论文
共 50 条
  • [31] An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Sakurai, Kouichi
    Lee, Dong Hoon
    ICCE: 2007 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 2007, : 283 - +
  • [32] Non-repudiation protocol for E-mail and its formal analysis
    Peng, Hongyan
    Li, Xiaojian
    Xia, Chunhe
    Deng, Jianfeng
    Zhou, Xiaofa
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (11): : 1914 - 1919
  • [33] E-mail marketing at the crossroads - A stakeholder analysis of unsolicited commercial e-mail (spam)
    Moustakas, E
    Ranganathan, C
    Duquenoy, P
    INTERNET RESEARCH, 2006, 16 (01) : 38 - 52
  • [34] E-mail
    ASEE PRISM, 3 (07):
  • [35] An E-mail
    代莹莹
    初中生学习(高), 2016, (03) : 45 - 45
  • [36] E-mail
    ASEE PRISM, 1995, 4 (09):
  • [38] E-mail
    Software World, 1999, 30 (02):
  • [40] E-mail
    綦荣亮
    中学英语园地(初中版), 2003, (12) : 23 - 24