Fady A. Mohamed, Elsayed E. Hemayed. Using trusted computing in trusted mail transfer protocol. Security and Communication Networks, 7(5):926-933, 2014. [doi]
@article{MohamedH14, title = {Using trusted computing in trusted mail transfer protocol}, author = {Fady A. Mohamed and Elsayed E. Hemayed}, year = {2014}, doi = {10.1002/sec.804}, url = {http://dx.doi.org/10.1002/sec.804}, researchr = {https://researchr.org/publication/MohamedH14}, cites = {0}, citedby = {0}, journal = {Security and Communication Networks}, volume = {7}, number = {5}, pages = {926-933}, }