Secure E-Mail and Public Key Cryptography: Together At Last?
Traditional public key encryption schemes involve complicated processes such as issuing and managing keys and digital certificates, integrating cryptographic functions into existing applications, and locating a recipient's certificate. The difficulty of performing these functions often overrides any value that an enterprise might get from public key-based mail security.
The link for this article located at Andrew Conry-Murray is no longer available.