About this book
This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure email and how they work. The final chapters include a discussion of getting started with encrypted email and how to live with it.
Written by an expert in software security and computer tools, Encrypted Email: The History and Technology of Message Privacy is designed for researchers and professionals working in email security and encryption. Advanced-level students interested in security and networks will also find the content valuable.
- Book Title Encrypted Email
- Book Subtitle The History and Technology of Message Privacy
- Series Title SpringerBriefs in Computer Science
- Series Abbreviated Title SpringerBriefs Computer Sci.
- DOI https://doi.org/10.1007/978-3-319-21344-6
- Copyright Information The Author(s) 2015
- Publisher Name Springer, Cham
- eBook Packages Computer Science Computer Science (R0)
- Softcover ISBN 978-3-319-21343-9
- eBook ISBN 978-3-319-21344-6
- Series ISSN 2191-5768
- Series E-ISSN 2191-5776
- Edition Number 1
- Number of Pages VII, 100
- Number of Illustrations 4 b/w illustrations, 0 illustrations in colour
Systems and Data Security
Computer Communication Networks
- Buy this book on publisher's site
“This interesting book covers the history and basics of email encryption. It includes three appendices and a two-page list of references. I found it to be well designed and interesting to read … covering a lot of material on encryption. … a good primer for someone who wants to start using encrypted email.” (Michael Moorman, Computing Reviews, November, 2015)