Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,381,610 papers from all fields of science
Search
Sign In
Create Free Account
Email encryption
Known as:
Encrypted email
, E-mail Encryption
, Secure E-mail
Expand
Email encryption is encryption of email messages to protect the content from being read by other entities than the intended recipients. Email…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Authentication
Bitpost
Communications protocol
DNS-based Authentication of Named Entities
Expand
Broader (2)
Internet privacy
Public key infrastructure
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Analysis Of Electronic Mail Encryption Technology
Junhui He
2017
Corpus ID: 63865340
He Junhui (Zhengzhou Information Science and Technology Institute,Zhengzhou 450001,China) hjhkong@qq.com Abstract: With the…
Expand
2015
2015
A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm
Abusukhon Ahmad
,
Bilal Hawashin
2015
Corpus ID: 42408194
Nowadays, after the significant development in the Internet, communication and information exchange around the world has become…
Expand
2015
2015
Market Guide for Network Sandboxing
Lawrence Orans
,
Jérémy D'Hoinne
2015
Corpus ID: 15765914
Choosing a network sandboxing solution is challenging due to the wide array of options available from established security…
Expand
2014
2014
Application-Scale Secure Multiparty Computation
J. Launchbury
,
David W. Archer
,
Thomas Dubuisson
,
Eric Mertens
European Symposium on Programming
2014
Corpus ID: 19014937
Secure multiparty computation MPC permits a collection of parties to compute a collaborative result without any of the parties or…
Expand
2012
2012
A Secure Email System Based on Identity Based Encryption
B. Kumar
,
Chitra Thirunal
2012
Corpus ID: 56108172
Now a days, email has become the most widely communication way in daily life. The main reason for using email is probably because…
Expand
2010
2010
Smart card authentication for Internet applications using NFC enabled phone
T. Mantoro
,
Admir Milisic
Proceeding of the 3rd International Conference on…
2010
Corpus ID: 15653404
With ever-increasing number of Internet users sharing their personal information online, means of securely authenticating them…
Expand
2007
2007
A Secure Email System Based on Fingerprint Authentication Scheme
Zhe Wu
,
Jie Tian
,
Liangbin Li
,
Cai-Ping Jiang
,
Xin Yang
IEEE Intelligence and Security Informatics
2007
Corpus ID: 13006484
Most of secure email systems adopt PKI and IBE encryption schemes to meet security demands in communications via emails, however…
Expand
2003
2003
Pragmatic solutions to make E-mail Security work
H. Seemann
GI Jahrestagung
2003
Corpus ID: 23045919
The concepts for secure e-mail are available for quite some time. Nevertheless only few users have adopted them.
2002
2002
A simulation game for teaching secure data communications protocols
Len Hamey
2002
Corpus ID: 114396179
With the widespread commercial use of the Internet, secure data communications over the Internet has become an important aspect…
Expand
Highly Cited
2001
Highly Cited
2001
Chaotic algorithms for data encryption
M. Sobhy
,
A. R. Shehata
IEEE International Conference on Acoustics…
2001
Corpus ID: 17475203
A system of encryption based on chaotic algorithms is described. The system is used for encrypting text and image files for the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE