共 50 条
- [2] Secure e-mail and databases using chaotic encryption [J]. ELECTRONICS LETTERS, 2000, 36 (10) : 875 - 876
- [5] TRANSPARENT PROXY FOR SECURE E-MAIL [J]. JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2010, 61 (03): : 183 - 188
- [6] Cryptonet:: Secure E-mail system [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 84 - 91
- [7] Research and Realization of Secure E-mail Based on Data Encryption and Digital Signature Technologies [J]. 2011 AASRI CONFERENCE ON APPLIED INFORMATION TECHNOLOGY (AASRI-AIT 2011), VOL 1, 2011, : 118 - 121
- [8] Deniable authenticated encryption for e-mail applications [J]. International Journal of Computers and Applications, 2020, 42 (05): : 429 - 438
- [9] Practical and secure E-mail system (PractiSES) [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3261 : 410 - 419