E-mail protocols with perfect forward secrecy.
Duncan S. WongXiaojian TianPublished in: Int. J. Secur. Networks (2012)
Keyphrases
- key distribution
- security properties
- electronic mail
- instant messaging
- key management
- mutual authentication
- spam filtering
- fault tolerant
- spam detection
- bi directional
- cryptographic protocols
- anti spam
- text mining
- communication medium
- key agreement protocol
- forward and backward
- communication protocol
- security protocols
- security analysis
- secret key
- authentication protocol
- elliptic curve
- database
- security requirements
- formal model
- ad hoc networks
- smart card
- key exchange
- digital libraries
- case study
- information systems