Cited By
View all- Wegner MRottmann SWolf LBoldrini Cde Amorim M(2016)SCTPCLProceedings of the Eleventh ACM Workshop on Challenged Networks10.1145/2979683.2979693(19-24)Online publication date: 3-Oct-2016
Email as we use it today makes no guarantees about message integrity, authenticity, or confidentiality. Users must explicitly encrypt and sign message contents using tools like PGP if they wish to protect themselves against message tampering, forgery, ...
This paper analyzes the working principle of the mail system, researches and develops on the three core modules of an E-mail system-E-mail sending module, E-mail receiving module, E-mail analysis and display module, and achieves the core function of an ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in