[1] |
WELLS T M , DENNIS A R . To e-mail or not to e-mail:the impact of media on psychophysiological responses and emotional content in utilitarian and romantic communication[J]. Computers in Human Behavior, 2016,54: 1-9.
|
[2] |
TAUBER A . A survey of certified mail systems provided on the Internet[J]. Computers & Security, 2011,30: 464-485.
|
[3] |
FERRER-GOMILLA J L , ONIEVA J A , PAYERAS M ,et al. Certified electronic mail:properties revisited[J]. Computers & Security, 2010,29(2): 167-179.
|
[4] |
KIM H , FEAMSTER N . Improving network management with software defined networking[J]. IEEE Communications Magazine, 2013,51(2): 114-119.
|
[5] |
ALI S T , SIVARAMAN V , RADFORD A ,et al. A survey of securing networks using software defined networking[J]. IEEE Transactions on Reliability, 2015,64(3): 1086-1097.
|
[6] |
BECHTOLD S , PERRIG A . Accountability in future Internet architectures[J]. Communications of the ACM, 2014,57(9): 21-23.
|
[7] |
WANG Y , SUSILO W , AU MH ,et al. Collusion-resistance in optimistic fair exchange[J]. IEEE Transactions on Information Forensics and Security, 2014,9(8): 1227-1239.
|
[8] |
ONIEVA J A , ZHOU J , LOPEZ J . Enhancing certified e-mail service for timeliness and multicast[C]// 2004 International Network Conference. Plymouth,UK, 2004: 327-336.
|
[9] |
MICALI S , . Simple and fast optimistic protocols for fair electronic exchange[C]// The twenty-second annual symposium on Principles of distributed computing. Boston,USA, 2003: 12-19.
|
[10] |
SHAO MH , WANG G , ZHOU J . Some common attacks against certified e-mail protocols and the countermeasures[J]. Computer Communications, 2006,29(15): 2759-2769.
|
[11] |
PAYERAS-CAPELLà M M , MUT-PUIGSERVER M , FERRER-GOMILA J L ,et al. No author based selective receipt in an efficient certified e-mail protocol[C]// 2009 17th Euromicro International Conference on Parallel,Distributed and Network-based Processing. Weimar, 2009: 387-392.
|
[12] |
PUIGSERVER M M , GOMILA J L F , ROTGER L H . Certified electronic mail protocol resistant to a minority of malicious third parties[C]// Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 2000). 2000: 1401-1405.
|
[13] |
ATENIESE G , MEDEIROS BD , GOODRICH MT . TRICERT:a distributed certified e-mail schemes[C]// 2001 Network and Distributed System Security Symposium. San Diego,USA, 2001.
|
[14] |
ZHOU J , ONIEVA J , LOPEZ J . Optimized multi-party certified e-mail protocols[J]. Information Management & Computer Security, 2005,13(5): 350-366.
|
[15] |
WANG C , LAN C , NIU S ,et al. An ID-based certified e-mail protocol with STTP suitable for wireless mobile environments[J]. Journal of Computers, 2013,8(1): 3-9.
|
[16] |
TAUBER A , APITZSCH J , BOLDRIN L . An interoperability standard for certified mail systems[J]. Computer Standards & Interfaces, 2012,34: 452-466.
|
[17] |
TAUBER A , KUSTOR P , KARNING B . Cross-border certified electronic mailing:a European perspective[J]. Computer Law & Security Review, 2013,29(1): 28-39.
|
[18] |
DRAPER-GIL G , FERRER-GOMILA JL , HINAREJOS MF ,et al. An optimistic certified e-mail protocol for the current Internet e-mail architecture[C]// 2014 IEEE Conference on Communications and Network Security(CNS). San Francisco, 2014: 382-390.
|
[19] |
PAULIN A , WELZER T . A universal system for fair non-repudiable certified e-mail without a trusted third party[J]. Computers & Security, 2013,32: 207-218.
|
[20] |
LARA A , KOLASANI A , Ramamurthy B . Network innovation using OpenFlow:a survey[J]. IEEE Communications Surveys & Tutorials, 2014,16(1): 493-512.
|
[21] |
KREUTZ D , RAMOS F M V , VERISSIMO P E ,et al. Softwaredefined networking:A comprehensive survey[J]. Proceedings of the IEEE, 2015,103(1): 14-76.
|
[22] |
SYVERSON P , VANOORSCHOT P C . A unified cryptographic protocol logic[R]. Technical Report,NRL Publication 5540-227,Naval Research Lab, 1996.
|
[23] |
HENDRIKX F , BUBENDORFER K , CHARD R . Reputation systems:A survey and taxonomy[J]. Journal of Parallel and Distributed Computing, 2015,75: 184-197.
|
[24] |
SRIVATSA M , XIONG L , LIU L . TrustGuard:countering vulnerabilities in reputation management for decentralized overlay networks[C]// The 14th international conference on World Wide Web (WWW2005). Chiba,Japan, 2005.
|