Using trusted computing in trusted mail transfer protocol

Fady A. Mohamed, Elsayed E. Hemayed. Using trusted computing in trusted mail transfer protocol. Security and Communication Networks, 7(5):926-933, 2014. [doi]

No reviews for this publication, yet.