Privacy enhanced mail in more detail

Citations of this article
Mendeley users who have this article in their library.
Get full text


Early 1993, four Requests For Comments (RFCs) have been made available as 'proposed standards'. In these RFCs, the specification of the security functions and the related management tasks have been defined to secure the Internet electronic mail system. The software which is being developed based on these RFCs is referred to as PEM software, PEM standing for 'Privacy Enhanced Mail'. This paper deals with a number of technical, functional and organizational aspects of Privacy Enhanced Mail. It sets out to explain what PEM is about, its underlying trust model, the services it offers, its encryption algorithms, its operation, the requirements for using PEM, and the consequences it has for the user's workplace. © 1993.




Zegwaart, E. (1993). Privacy enhanced mail in more detail. Computer Networks and ISDN Systems, 25(SUPPL. 2), 63–71.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free