TITLE

Prying Eyes, Keep Out

AUTHOR(S)
Branscum, Deborah
PUB. DATE
June 2000
SOURCE
Newsweek (Atlantic Edition);06/12/2000 (Atlantic Edition), Vol. 135 Issue 24, p75
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Discusses several companies that improve the privacy of e-mail systems. Programs by QVtech and Disappearing Inc. which work with Microsoft Outlook and allow messages to be read only by the designated recipient; How the software digitally encrypts messages; Details of ZipLip.com's offering; Security features of the companies; Potential problems with the software.
ACCESSION #
3199536

 

Related Articles

  • Prying Eyes, Keep Out. Branscum, Deborah // Newsweek (Pacific Edition);06/12/2000 (Pacific Edition), Vol. 135 Issue 24, p54 

    Discusses several companies that improve the privacy of e-mail systems. Programs by QVtech and Disappearing Inc. which work with Microsoft Outlook and allow messages to be read only by the designated recipient; How the software digitally encrypts messages; Details of ZipLip.com's offering;...

  • BOLSTER security for your legacy OPC server. Neitzel, Lee // InTech;Mar/Apr2014, Vol. 61 Issue 2, p18 

    The article focuses on the OPC.NET Microsoft .NET interface which is designed to provide wrapping security to OPC servers through its association with Microsoft .NET security software. Topics discussed include the distributed component object model (DCOM) equivalent Windows Communication...

  • Prying Eyes, Keep Out. Branscum, Deborah // Newsweek;6/5/2000, Vol. 135 Issue 23, p80 

    Focuses on companies that provide businesses with electronic mail systems that have greater privacy and control. Example of John Blumenthal's company, QVtech; Features and cost of software that allows Internet and intranet users to encrypt messages; Liability that e-mail can represent.

  • A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme. Hung-Yu Chien; Yuan-Liang Tang; Ying-Lun Chen // International MultiConference of Engineers & Computer Scientists;2007, p371 

    The time-bound hierarchical cryptographic key assignment is to solve access control in a temporal partial-order hierarchy so that legal users can accesses a distinct resource among assigned classes at predetermined time period by the user's owned cryptographic key. Though many related...

  • Construction of a New Biometric-Based Key Derivation Function and Its Application. Seo, Minhye; Park, Jong Hwan; Kim, Youngsam; Cho, Sangrae; Lee, Dong Hoon; Hwang, Jung Yeon // Security & Communication Networks;12/2/18, p1 

    Biometric data is user-identifiable and therefore methods to use biometrics for authentication have been widely researched. Biometric cryptosystems allow for a user to derive a cryptographic key from noisy biometric data and perform a cryptographic task for authentication or encryption. The...

  • A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks. Chen, Huifang; Ge, Linlin; Xie, Lei // Sensors (14248220);Jul2015, Vol. 15 Issue 7, p17057 

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at...

  • AIMFIRST: Planning for Mission Assurance. Haigh, Tom; Harp, Steven; Payne, Charles // Proceedings of the International Conference on Information Warfa;2010, p416 

    Today network and system managers are not equipped to support mission assurance objectives. Often they are unaware of the mission impact of their actions, e.g. changing firewall or router rules or bringing a server down for maintenance, until someone associated with a mission complains of a...

  • Randomised representations. Smart, N. P.; Oswald, E.; Page, D. // IET Information Security;Jun2008, Vol. 2 Issue 2, p19 

    The authors show that a number of existing methods for side-channel defence are essentially the same techniques presented in different contexts. By abstracting this technique, they present necessary conditions which need to be satisfied for it to be successful in preventing side-channel...

  • QV Tech puts e-mail security in the hands of the sender. Degnan, Christa // PC Week;10/04/99, Vol. 10 Issue 40, p32 

    Reports on QV Tech Inc.'s development of Interosa, a technology that sits alongside SMTP servers to encrypt messages for any Multipurpose Internet Mail Extension client. Software's use of the open Blowfish encryption method developed by security specialist Bruce Schneier; Pricing of the system;...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics