Using trusted computing in trusted mail transfer protocol

Fady A. Mohamed, Elsayed E. Hemayed. Using trusted computing in trusted mail transfer protocol. Security and Communication Networks, 7(5):926-933, 2014. [doi]

@article{MohamedH14,
  title = {Using trusted computing in trusted mail transfer protocol},
  author = {Fady A. Mohamed and Elsayed E. Hemayed},
  year = {2014},
  doi = {10.1002/sec.804},
  url = {http://dx.doi.org/10.1002/sec.804},
  researchr = {https://researchr.org/publication/MohamedH14},
  cites = {0},
  citedby = {0},
  journal = {Security and Communication Networks},
  volume = {7},
  number = {5},
  pages = {926-933},
}