Using trusted computing in trusted mail transfer protocol
暂无分享,去创建一个
In this era, hacking techniques have become more dangerous and more widely used across the Internet. If we want to send and receive a trusted email, our current techniques would not be efficient. In this paper, we propose a new protocol for trusting our emails based on Trusted Computing. We combine the hardware-based cryptography of the Trusted Platform Module and the Remote Attestation with the email protocols. The details of the proposed protocol and its security analysis are discussed in this paper. Copyright ©2013 John Wiley & Sons, Ltd.
[1] Jürgen Nützel,et al. Towards Trust in Digital Rights Management Systems , 2006, TrustBus.
[2] John Zic,et al. A Trust Enhanced Email Application Using Trusted Computing , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.
[3] David A. Basin,et al. Securing the Distribution and Storage of Secrets with Trusted Platform Modules , 2007, WISTP.