Login / Signup
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications.
Lars Ewers
Wolfgang Kubbilun
Lijun Liao
Jörg Schwenk
Published in:
Communications and Multimedia Security (2005)
Keyphrases
</>
email
data sets
security issues
data encryption
authentication scheme
identity management
lightweight
highly efficient
security requirements
security protocols
scalar product
cryptographic protocols
security level
user authentication
digital signature
standard model
text mining
database systems
website