Entry Mitchell:1989:MDS from compj1980.bib
Last update: Sat Jan 6 02:03:49 MST 2018
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Mitchell:1989:MDS,
author = "C. Mitchell",
title = "Multi-destination secure electronic mail",
journal = j-COMP-J,
volume = "32",
number = "1",
pages = "13--15",
month = feb,
year = "1989",
CODEN = "CMPJA6",
DOI = "https://doi.org/10.1093/comjnl/32.1.13",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Dec 4 14:48:26 MST 2012",
bibsource = "Compendex database; Distributed/CCR.bib;
http://comjnl.oxfordjournals.org/content/32/1.toc;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_01/",
URL = "http://comjnl.oxfordjournals.org/content/32/1/13.full.pdf+html;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_01/tiff/13.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_01/tiff/14.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_01/tiff/15.tif",
abstract = "Electronic mail messages are often sent to more than
one destination; this gives rise to problems when
security is required. A recent draft for a standard for
securing electronic mail messages suggests a novel
mechanism for solving the problem. Unfortunately, as
shown herein, the solution is flawed and can allow the
construction of fake messages which will pass the
authenticity tests. [{\it Ed. Note}: This article
describes problems in RFC 989 which are believed to
have been fixed by RFC 1040]",
acknowledgement = ack-nhfb,
affiliation = "Hewlett--Packard Labs.",
affiliationaddress = "Bristol, Engl",
classcodes = "B6210G (Electronic mail); C6130 (Data handling
techniques)",
classification = "723; 902; B6210G (Electronic mail); C6130 (Data
handling techniques)",
corpsource = "Hewlett--Packard Labs., Bristol, UK",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "authenticity tests; Authenticity tests; Cryptography;
electronic mail; Electronic Mail; fake; Fake messages;
messages; multidestination mail; Multidestination
Message Authentication, Multidestination mail; secure
electronic mail; Secure Electronic Mail; Secure
electronic mail; security of data; standards;
Standards",
thesaurus = "Electronic mail; Security of data; Standards",
treatment = "P Practical",
}
Related entries
- allow,
30(5)437,
31(4)296
- Authentication,
31(6)503
- been,
23(2)142,
24(4)320,
32(2)127,
32(2)142,
32(2)152,
32(2)162,
32(5)461
- C6130,
31(6)503,
31(6)553,
31(6)557,
31(6)561,
32(1)16,
32(3)238,
32(3)241,
32(6)494,
32(6)505
- construction,
23(3)211,
23(4)307,
26(2)142,
26(3)193,
28(4)379,
32(4)377,
32(6)541
- cryptography, 25-3-400c-400,
26(1)68,
28(3)343,
29(4)289,
31(6)503,
32(3)241,
32(5)470
- describe,
26(3)235,
27(4)368-1,
29(3)277,
31(6)496,
32(2)108,
32(2)142
- draft,
29(3)193
- ed.,
24(1)96,
25(2)287
- electronic,
23(3)200,
25(2)161,
26(3)247,
28(1)1,
29(3)193,
30(5)469,
32(3)252,
32(5)453,
32(6)481,
32(6)482,
32(6)494,
32(6)505,
32(6)516,
32(6)524
- fixed,
23(1)37,
24(4)339,
25(1)87,
25(2)231,
28(4)379,
30(6)558,
31(3)243,
32(3)228
- give,
30(5)437,
31(6)496,
32(2)142
- handling,
23(2)147,
24(1)3,
24(1)17,
24(1)42,
24(2)97,
24(2)130,
25(3)347,
25(4)448,
25(4)486,
26(3)205,
28(2)117,
29(5)477-1,
30(3)277,
30(6)569,
31(1)61,
31(2)133,
31(6)503,
31(6)553,
31(6)557,
31(6)561,
32(1)16,
32(3)238,
32(3)241,
32(5)386,
32(6)494,
32(6)505
- have,
24(4)320,
29(4)289,
31(3)243,
32(2)142,
32(2)152,
32(2)162,
32(5)461
- mail,
28(1)1,
30(5)469
- mechanism,
23(2)147,
25(1)17,
25(1)87,
26(1)52,
27(1)47,
28(3)298,
29(1)1,
29(2)109,
29(3)241,
29(4)361,
30(5)437,
31(4)296,
31(6)503,
31(6)525,
32(1)24,
32(1)63,
32(4)341
- message,
24(1)17,
24(1)56,
25(4)410,
29(2)109,
30(5)437,
30(6)541,
31(4)289,
31(4)313,
32(1)29,
32(4)362
- Mitchell, C.,
32(4)374,
32(4)379
- more,
23(2)142,
28(2)162,
30(5)437,
31(4)289,
32(2)152
- note,
24(3)278,
25(1)158,
25(1)159,
25(3)397,
26(1)93,
26(2)187,
26(2)187,
26(2)188-1,
26(3)205,
26(3)282,
27(1)83,
27(1)84,
27(1)86,
27(1)87,
27(2)179,
27(3)283-1,
27(3)283-3,
27(3)284,
27(3)284-1,
27(4)373,
27(4)375,
27(4)376,
28(2)111,
28(3)343,
29(2)189-1,
29(4)378,
29(4)380-1,
29(5)477,
29(6)572,
29(6)573,
30(2)189,
30(3)276-1,
30(3)276-2,
30(3)282-1,
30(3)283,
30(4)376,
30(4)378,
31(3)285,
31(5)474,
31(6)564,
31(6)565,
31(6)567,
31(6)570,
32(1)16,
32(1)90,
32(1)91,
32(1)93,
32(2)187,
32(3)281,
32(4)377,
32(5)474
- novel,
30(3)258
- one,
23(2)165,
27(4)368-1,
28(3)313,
28(5)530,
30(5)437,
31(6)496,
32(2)152,
32(2)175,
32(5)461
- recent,
26(4)354
- required,
25(4)471,
29(4)289,
31(4)289,
31(4)296
- security, 23-3-242a-242,
23(3)261,
27(1)3,
27(3)209,
29(1)9,
29(4)300,
30(3)249,
31(6)503
- solution,
23(1)85,
23(4)338,
24(2)180,
24(2)184,
25(1)56,
25(2)231,
27(2)171,
28(4)366,
29(2)182,
30(4)376,
31(1)76,
32(1)45,
32(2)152,
32(2)162,
32(2)187
- solving,
23(3)274,
24(1)29,
24(1)87,
24(4)353,
24(4)384-2,
25(2)264,
26(4)383,
28(2)105,
28(4)353,
30(2)189,
31(6)557,
32(6)541
- standard,
23(1)53,
23(2)152-1,
24(3)256,
24(4)295,
25(1)121,
25(4)410,
26(1)60,
29(3)193,
29(4)340,
29(6)495,
30(4)316,
32(3)273,
32(5)422,
32(6)505
- test,
23(2)142,
27(4)340,
27(4)375,
28(4)414,
30(1)63,
31(1)12
- than,
24(1)95,
24(4)320,
31(4)289,
32(5)461
- when,
31(6)496,
32(2)122,
32(2)142
- which,
23(2)142,
24(4)320,
29(3)201,
30(3)214,
30(5)437,
31(3)243,
31(4)289,
31(4)296,
32(1)45,
32(1)93,
32(2)108,
32(2)122,
32(2)142,
32(2)162,
32(5)461
- will,
29(4)289