A Certified E-mail System with Receiver's Selective Usage of Delivery Authority
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Fair certified e-mail delivery
Proceedings of the 2004 ACM symposium on Applied computing
Analyzing security protocols with secrecy types and logic programs
Journal of the ACM (JACM)
On timeliness of a fair non-repudiation protocol
InfoSecu '04 Proceedings of the 3rd international conference on Information security
An abuse-free fair contract signing protocol based on the RSA signature
WWW '05 Proceedings of the 14th international conference on World Wide Web
SELS: a secure e-mail list service
Proceedings of the 2005 ACM symposium on Applied computing
Computer-assisted verification of a protocol for certified email
Science of Computer Programming - Special issue: Static analysis symposium (SAS 2003)
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Accountability protocols: Formalized and verified
ACM Transactions on Information and System Security (TISSEC)
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Securing the drop-box architecture for assisted living
Proceedings of the fourth ACM workshop on Formal methods in security
Providing Certified Mail Services on the Internet
IEEE Security and Privacy
MIV'06 Proceedings of the 6th WSEAS International Conference on Multimedia, Internet & Video Technologies
Efficient and secure protocol in fair certified E-mail delivery
WSEAS Transactions on Information Science and Applications
A new fair non-repudiation protocol for secure negotiation and contract signing
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Distributed support for public and private accountability in digital ecosystems
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Some common attacks against certified email protocols and the countermeasures
Computer Communications
Computer-assisted verification of a protocol for certified email
SAS'03 Proceedings of the 10th international conference on Static analysis
An abuse-free fair contract-signing protocol based on the RSA signature
IEEE Transactions on Information Forensics and Security
Is the verification problem for cryptographic protocols solved?
Proceedings of the 11th international conference on Security Protocols
Design and implementation of an inline certified e-mail service
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
On the security of a certified e-mail scheme with temporal authentication
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
On the security of a certified e-mail scheme
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
An evenhanded certified email system for contract signing
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
An efficient certified email protocol
ISC'07 Proceedings of the 10th international conference on Information Security
Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy
Security and Communication Networks
Hi-index | 0.00 |
This paper presents a new protocol for certified email. The protocol aims to combine security, scalability, easy implementation, and viable deployment. The protocol relies on a light on-line trusted third party; it can be implemented without any special software for the receiver beyond a standard email reader and web browser, and does not require any public-key infrastructure.