Some common attacks against certified email protocols and the countermeasures.
Min-Hua ShaoGuilin WangJianying ZhouPublished in: Comput. Commun. (2006)
Keyphrases
- countermeasures
- information security
- spam filtering
- enron email
- power analysis
- email messages
- java card
- security measures
- anti spam
- instant messaging
- security protocols
- cyber attacks
- mailing lists
- databases
- case study
- information systems
- information warfare
- cryptographic protocols
- spam filters
- resource constrained
- computer systems