Next:
3.1.7 Names and distributed
Up:
3.1 Exercises
Previous:
3.1.5 Remote Procedure Call
3.1.6 Security
Describe some of the ways in which conventional email is vulnerable to eavesdropping, masquerading, tampering, replay and denial of service.
Suggest methods by which email could be protected against each of these forms of attack.
Next:
3.1.7 Names and distributed
Up:
3.1 Exercises
Previous:
3.1.5 Remote Procedure Call
Ian Wakeman 2005-02-22