Login / Signup

Using trusted computing in trusted mail transfer protocol.

Fady A. MohamedElsayed E. Hemayed
Published in: Secur. Commun. Networks (2014)
Keyphrases