Search
Search Results
-
Email Security: S/MIME
S/MIME is a standard to encrypt and digitally sign e-mails, which is fully compatible with the MIME data format. It uses PKCS#7/CMS as cryptographic... -
Attacks on S/MIME and OpenPGP
The conceptual weaknesses of the cryptographic constructs used in S/MIME and OpenPGP have been known since 2000. In 2018, these weaknesses were... -
Issue and Manage S/MIME Secure Email Certificates
An S/MIME digital certificate is similar to a TLS Client certificate, except that it is used for key exchange and authentication in S/MIME secure... -
S/MIME Secure Email
Years ago, there were a variety of incompatible schemes for attaching files to emails. The IETF created a standard for email attachments which is now... -
S/MIME
Im Gegensatz zum OpenPGP-Datenformat, das auch für andere Einsatzzwecke wie z. B. Dateiverschlüsselung verwendet wird, wurde S/MIME ausschließlich... -
Angriffe auf S/MIME und OpenPGP
Die im Bereich der E-Mail-Sicherheit verwendete Kryptographie (S/MIME, OpenPGP) stammt aus den 1990er Jahren. Zwar wurden die kryptographischen... -
Computer Network Security Protocols
The rapid growth of the Internet and corresponding Internet community has fueled the rapid growth of both individual and business communications... -
Pro Active Directory Certificate Services Creating and Managing Digital Certificates for Use in Microsoft Networks
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption,...
-
Asymmetric Key Cryptography
Asymmetric encryption is a brand-new, highly advanced encryption method that employs two keys. Public and private keys are the names given to these... -
Key Management
Managing cryptographic keys is one of the most difficult parts of a cryptographic system. It is particularly difficult if only symmetric key... -
Work in Progress: Can Johnny Encrypt E-Mails on Smartphones?
E-mail is nearly 50 years old and is still one of the most used communication protocols nowadays. However, it has no support for End-to-end... -
PrivMail: A Privacy-Preserving Framework for Secure Emails
Emails have improved our workplace efficiency and communication. However, they are often processed unencrypted by mail servers, leaving them open to... -
An Email a Day Could Give Your Health Data Away
Are doctors allowed to communicate with their patients via email? The GDPR sets the bar high for securing health data: either an... -
A One-Size-Fits-Three Representation Learning Framework for Patient Similarity Search
Patient similarity search is an essential task in healthcare. Recent studies adopted electronic health records (EHRs) to learn patient...
-
Computer Network Security Fundamentals
In this chapter, we give a general definition of the state of security in any environment and then localize this security concept in a computer... -
Imitation Learning of Long-Horizon Manipulation Tasks Through Temporal Sub-action Sequencing
This research proposes an approach to long-horizon manipulation which uses video and kinesthetic demonstrations to imitate human actions. The task...