메뉴 건너뛰기




Volumn 7, Issue 9, 2011, Pages 5353-5362

A secure e-mail protocol for mobile devices

Author keywords

E mail; Man in the middle attack; Mobile devices; Perfect forward secrecy

Indexed keywords

E-MAIL PROTOCOL; MAN IN THE MIDDLE ATTACKS; NETWORK ENVIRONMENTS; PERFECT FORWARD SECRECY; PRETTY GOOD PRIVACY;

EID: 80052463851     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (29)
  • 1
    • 51249088358 scopus 로고    scopus 로고
    • WiMAX Forum, http://www.wimaxforum.org/home/.
    • WiMAX Forum
  • 4
    • 71149116914 scopus 로고    scopus 로고
    • A model of hierarchical attention focusing based on saliency map and its application for a display method for small mobile devices
    • T. Toriu, S. Nakajima and H. Hama, A model of hierarchical attention focusing based on saliency map and its application for a display method for small mobile devices, International Journal of Innovative Computing, Information and Control, vol.5, no.11(B), pp.4215-4224, 2009.
    • (2009) International Journal of Innovative Computing, Information and Control , vol.5 , Issue.11 B , pp. 4215-4224
    • Toriu, T.1    Nakajima, S.2    Hama, H.3
  • 5
    • 63449113935 scopus 로고    scopus 로고
    • On dynamic mechanisms of mobile services adoption in social network
    • Y. Huo, W. Li and D. Yang, On dynamic mechanisms of mobile services adoption in social network, ICIC Express Letters, vol.3, no.1, pp.79-84, 2009.
    • (2009) ICIC Express Letters , vol.3 , Issue.1 , pp. 79-84
    • Huo, Y.1    Li, W.2    Yang, D.3
  • 6
    • 63449127894 scopus 로고    scopus 로고
    • An efficient approach for thinning wireless mobile messages
    • P. P. A. Haleem and M. P. Sebastian, An efficient approach for thinning wireless mobile messages, ICIC Express Letters, vol.3, no.1, pp.99-106, 2009.
    • (2009) ICIC Express Letters , vol.3 , Issue.1 , pp. 99-106
    • Haleem, P.P.A.1    Sebastian, M.P.2
  • 9
    • 12544256656 scopus 로고    scopus 로고
    • Secure email protocols providing perfect forward secrecy
    • H. M. Sun, B. T. Hsieh and H. J. Hwang, Secure email protocols providing perfect forward secrecy, IEEE Communication Letters, vol.9, no.1, pp.58-60, 2005.
    • (2005) IEEE Communication Letters , vol.9 , Issue.1 , pp. 58-60
    • Sun, H.M.1    Hsieh, B.T.2    Hwang, H.J.3
  • 10
    • 27644589302 scopus 로고    scopus 로고
    • Flaws in an e-mail protocol of Sun, Hsieh, and Hwang
    • A. Dent, Flaws in an e-mail protocol of Sun, Hsieh, and Hwang, IEEE Communications Letters, vol.9, no.8, pp.718-719, 2005.
    • (2005) IEEE Communications Letters , vol.9 , Issue.8 , pp. 718-719
    • Dent, A.1
  • 11
    • 33745192079 scopus 로고    scopus 로고
    • Robust e-mail protocols with perfect forward secrecy
    • B. H. Kim, J. H. Koo and D. H. Lee, Robust e-mail protocols with perfect forward secrecy, IEEE Communications Letters, vol.10, no.6, pp.510-512, 2006.
    • (2006) IEEE Communications Letters , vol.10 , Issue.6 , pp. 510-512
    • Kim, B.H.1    Koo, J.H.2    Lee, D.H.3
  • 12
    • 70349739567 scopus 로고    scopus 로고
    • A forward-secure e-mail protocol without certificated public keys
    • J. O. Kwon, I. R. Jeong and D. H. Lee, A forward-secure e-mail protocol without certificated public keys, Information Sciences, vol.179, no.24, pp.4277-4231, 2009.
    • (2009) Information Sciences , vol.179 , Issue.24 , pp. 4231-4277
    • Kwon, J.O.1    Jeong, I.R.2    Lee, D.H.3
  • 13
    • 84976825099 scopus 로고
    • How to expose an eavesdropper
    • R. Rivest and A. Shamir, How to expose an eavesdropper, Communications of the ACM, vol.27, no.4, pp.393-395, 1984.
    • (1984) Communications of the ACM , vol.27 , Issue.4 , pp. 393-395
    • Rivest, R.1    Shamir, A.2
  • 16
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, vol.21, no.2, pp.120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 20
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • N. Koblitz, Elliptic curve cryptosystem, Mathematics of Computation, vol.48, pp.203-209, 1987.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 22
    • 77953884961 scopus 로고    scopus 로고
    • An efficient authenticated encryption scheme based on elliptic curve cryptosystem for broadcast environments
    • C.-C. Chang, Y.-W. Lai and J.-H. Yang, An efficient authenticated encryption scheme based on elliptic curve cryptosystem for broadcast environments, ICIC Express Letters, vol.4, no.1, pp.95-99, 2010.
    • (2010) ICIC Express Letters , vol.4 , Issue.1 , pp. 95-99
    • Chang, C.-C.1    Lai, Y.-W.2    Yang, J.-H.3
  • 28
    • 46149119679 scopus 로고    scopus 로고
    • Practical evaluation of the performance impact of security mechanisms in sensor networks
    • Tampa
    • M. Passing and F. Dressler, Practical evaluation of the performance impact of security mechanisms in sensor networks, Proc. of the 31st IEEE Conf. on Local Computer Networks, Tampa, pp.623-629, 2006.
    • (2006) Proc. of the 31st IEEE Conf. on Local Computer Networks , pp. 623-629
    • Passing, M.1    Dressler, F.2
  • 29
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • N. R. Potlapally, S. Ravi, A. Raghunathan and N. K. Jha, A study of the energy consumption characteristics of cryptographic algorithms and security protocols, IEEE Transactions on Mobile Computing, vol.5, no.2, pp.128-143, 2006.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.