SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Basagiannis S, Petridou S, Alexiou N, Papadimitriou G, Katsaros P. Quantitative analysis of a certified e-mail protocol in mobile environments: a probabilistic model checking approach. Computers & Security 2011; 30:257272.
  • 2
    Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric metric encryption schemes. In Advances in Cryptology – CRYPTO'99, LNCS, Vol. 1666. Spring-Verlag, 1999; 537554.
  • 3
    Atkins D, Stallings W, Zimmermann P. PGP Message Exchange Formats. Internet Draft, 1995.
  • 4
    Balenson D. Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers. RFC 1423, 1993.
  • 5
    Galvin J, Murphy G, Crocker S, Freed N. MIME Object Security Services. RFC 1848, 1995.
  • 6
    Elkins M. MIME Security with Pretty Good Privacy (PGP). Internet Draft, 1995.
  • 7
    Schneier B. E-mail security with PGP and PEM. How to Keep Your Electronic Mail Private, John Wiley & Sons, Inc.: Toronto 1995.
  • 8
    Menezes AJ, Van Oorschot PC, Vanstone SA. Handbook of Applied Cryptography. CRC Press, 1997.
  • 9
    Chang C-C, Wu Y-C, Chang S-C. A novel e-mail protocol using three-party password-authenticated key exchange. In Proceedings of International Conference on Security Technology (SECTECH'08), December 2008; 150154.
  • 10
    Kim B, Koo J, Lee D. Robust e-mail protocols with perfect forward secrecy. IEEE Communications Letters 2006; 10(6):510512.
  • 11
    Lin I-C, Lin Y-B, and Wang C-M. An Improvement on Secure E-mail Protocols Providing Perfect Forward Secrecy, in Proceedings of the 9th Joint Conference on Information Science (JCIS), 697700, Kaohsiung, Taiwan October 2006.
  • 12
    Sun H-M, Hsieh B-T, Hwang H-J. secure e-mail protocols providing perfect forward secrecy. IEEE Communications Letters 2005; 15(8):5860.
  • 13
    Abadi M, Glew N, Horne B, Pinkas B. certified email with a light on-line trusted third party: design and implementation. In Proceedings of the 11th International World Wide Web Conference, Honolulu, Hawaii, USA, 2002; 387395.
  • 14
    Zhou J. On the security of a multi-party certified email protocol. Lecture Notes in Computer Science 2004; 3269:277280.
  • 15
    Diffie W, Hellman ME. New directions in cryptography. IEEE Transactions on Information Theory 1976; IT-22(6):644654.
  • 16
    Bao F, Deng RH, Mao W. efficient and practical fair exchange protocols with off-line TTP. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1998; 7785.
  • 17
    Dent AW. Flaws in an e-mail protocol of Sun, Hsieh, and Hwang. IEEE Communications Letters 2005; 9(8):718719.
  • 18
    Phan RC-W. Cryptanalysis of e-mail protocols providing perfect forward secrecy. Computer Standards & Interfaces 2008; 30(3):101105.
  • 19
    Yoon EJ, Yoo KY. Cryptanalysis of robust e-mail protocols with perfect forward secrecy. IEEE Communications Letters 2007; 11(5).
  • 20
    Kwon JO, Jeong IR, Sakurai K, Lee DH. Efficient verifier-based password-authenticated key exchange in the three-party setting. Computer Standards & Interfaces 2007; 29(5):513520.
  • 21
    Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):120126.
  • 22
    Shamir A. identity-based cryptography and signature schemes. Proceedings of International Conference on Advances in Cryptology CRYPTO'84, August 1984; 4753.