Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,160,671 papers from all fields of science
Search
Sign In
Create Free Account
Email encryption
Known as:
Encrypted email
, E-mail Encryption
, Secure E-mail
Expand
Email encryption is encryption of email messages to protect the content from being read by other entities than the intended recipients. Email…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Authentication
Bitpost
Communications protocol
DNS-based Authentication of Named Entities
Expand
Broader (2)
Internet privacy
Public key infrastructure
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm
Abusukhon Ahmad
,
Bilal Hawashin
2015
Corpus ID: 42408194
Nowadays, after the significant development in the Internet, communication and information exchange around the world has become…
Expand
2014
2014
Application-Scale Secure Multiparty Computation
J. Launchbury
,
David W. Archer
,
Thomas Dubuisson
,
Eric Mertens
European Symposium on Programming
2014
Corpus ID: 19014937
Secure multiparty computation MPC permits a collection of parties to compute a collaborative result without any of the parties or…
Expand
2012
2012
Achieving key privacy without losing CCA security in proxy re-encryption
Jun Shao
,
Peng Liu
,
Yuan Zhou
Journal of Systems and Software
2012
Corpus ID: 14120907
2010
2010
Email system architecture for HITECH compliance
Syeda Uzma Gardazi
,
A. A. Shahid
The 2nd International Conference on Software…
2010
Corpus ID: 12139589
This paper aims at proposing a guideline for the health care industry covered under Health Insurance Portability & Accountability…
Expand
2007
2007
A Trustworthy Email System Based on Instant Messaging
Wenmao Zhang
,
J. Bi
,
Miaohui Zhang
,
Zheng Qin
Business Information Systems
2007
Corpus ID: 33749532
Email service is a killer application in the Internet. Due to the problem of SPAM, building a trustworthy and secure email…
Expand
Review
2006
Review
2006
PGP & GPG: Email for the Practical Paranoid
Michael W. Lucas
2006
Corpus ID: 60460862
OpenPGP is the most widely used email encryption standard in the world. It is based on PGP (Pretty Good Privacy) as originally…
Expand
2005
2005
Lightweight Encryption for Email
B. Adida
,
S. Hohenberger
,
R. Rivest
Workshop on Steps to Reducing Unwanted Traffic on…
2005
Corpus ID: 14490646
Email encryption techniques have been available for more than a decade, yet none has been widely deployed. The problems of key…
Expand
2005
2005
Quantum confinement of magnetic-dipolar oscillations in ferrite discs
E. Kamenetskii
,
M. Sigalov
,
R. Shavit
2005
Corpus ID: 36354129
Because of confinement phenomena, semiconductor quantum dots show typical atomic properties such as discrete energy levels and…
Expand
2004
2004
Controlling Spam by Secure Internet Content Selection
A. Herzberg
International Conference on Security and…
2004
Corpus ID: 2291822
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure…
Expand
2000
2000
On site: using telemedicine in the Department of Defense
J. Rodger
,
P. Pendharkar
CACM
2000
Corpus ID: 43025023
I n order to meet increasing global crises, the U.S. military must find ways to more effectively manage manpower and time. Joint…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE