Double trouble for e-mail security

被引:0
|
作者
Hoffman, P
机构
来源
BYTE | 1998年 / 23卷 / 05期
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:40 / 40
页数:1
相关论文
共 50 条
  • [1] SECURITY OF E-MAIL
    DUBB, HE
    [J]. SCIENCE, 1993, 262 (5135) : 827 - 827
  • [2] E-mail trouble: Love and addiction @ the matrix
    Bonomo, J
    [J]. GEORGIA REVIEW, 2000, 54 (03): : 573 - 580
  • [3] A proxy approach to e-mail security
    Brown, I
    Snow, CR
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1999, 29 (12): : 1049 - 1060
  • [4] Computer security bulletins by e-mail
    不详
    [J]. JOURNAL OF THE AMERICAN DENTAL ASSOCIATION, 2004, 135 (04): : 426 - 426
  • [5] An improved e-mail security protocol
    Schneier, B
    Hall, C
    [J]. 13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 227 - 230
  • [6] On the security of a certified E-mail scheme
    Wang, GL
    Bao, F
    Zhou, JY
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 48 - 60
  • [7] E-mail security gets personal
    Paulson, LD
    [J]. COMPUTER, 2004, 37 (01) : 26 - 26
  • [9] E-mail about e-mail?
    Recine, L
    [J]. DATAMATION, 1996, 42 (13): : 7 - 8
  • [10] E-mail minus 'E-mail'
    Solovy, A
    [J]. HOSPITALS & HEALTH NETWORKS, 2002, 76 (11): : 26 - 26