[Proceedings 1988] Fourth Aerospace Computer Security Applications
DOI: 10.1109/acsac.1988.113409
|View full text |Cite
|
Sign up to set email alerts
|

Privacy enhanced electronic mail

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…This has two effects. First, some user agents do not allow users (or other processes) to add special header fields holding the extra information needed to send privacy-enhanced mail; 5 The encapsulation mechanism chosen is similar to one widely used in electronic mail throughout the Internet [36]; that standard delimits encapsulated material between two identical delimiter lines. However, that privacy-enhanced mail allows multiple encapsulated bodies to be present either nested or sequentially introduces ambiguity, so the beginning and ending delimiters must bedifferent.…”
Section: Sending a Privacy-enhanced Mail Messagementioning
confidence: 99%
See 1 more Smart Citation
“…This has two effects. First, some user agents do not allow users (or other processes) to add special header fields holding the extra information needed to send privacy-enhanced mail; 5 The encapsulation mechanism chosen is similar to one widely used in electronic mail throughout the Internet [36]; that standard delimits encapsulated material between two identical delimiter lines. However, that privacy-enhanced mail allows multiple encapsulated bodies to be present either nested or sequentially introduces ambiguity, so the beginning and ending delimiters must bedifferent.…”
Section: Sending a Privacy-enhanced Mail Messagementioning
confidence: 99%
“…We should note in passing that descriptions of earlier versions of these protocols have appeared in the literature [5] [28] [29]; unlike these, however, the focus of this paper is not only on the protocols themselves but also on the reasons that the choices involved in designing the proposals were made. We hope to provide a broader perspective on some of the design decisions, as well as placing them more completely in context than other work.…”
Section: Introductionmentioning
confidence: 99%