Using trusted computing in trusted mail transfer protocol

Fady A. Mohamed, Elsayed E. Hemayed. Using trusted computing in trusted mail transfer protocol. Security and Communication Networks, 7(5):926-933, 2014. [doi]

Abstract

Abstract is missing.