Early 1993, four Requests For Comments (RFCs) have been made available as 'proposed standards'. In these RFCs, the specification of the security functions and the related management tasks have been defined to secure the Internet electronic mail system. The software which is being developed based on these RFCs is referred to as PEM software, PEM standing for 'Privacy Enhanced Mail'. This paper deals with a number of technical, functional and organizational aspects of Privacy Enhanced Mail. It sets out to explain what PEM is about, its underlying trust model, the services it offers, its encryption algorithms, its operation, the requirements for using PEM, and the consequences it has for the user's workplace. © 1993.
Zegwaart, E. (1993). Privacy enhanced mail in more detail. Computer Networks and ISDN Systems, 25(SUPPL. 2), 63–71. https://doi.org/10.1016/0169-7552(93)90106-E