Using trusted computing in trusted mail transfer protocol

Fady A. Mohamed, Elsayed E. Hemayed. Using trusted computing in trusted mail transfer protocol. Security and Communication Networks, 7(5):926-933, 2014. [doi]

Authors

Fady A. Mohamed

This author has not been identified. Look up 'Fady A. Mohamed' in Google

Elsayed E. Hemayed

This author has not been identified. Look up 'Elsayed E. Hemayed' in Google