This book tries to discuss the various certified email protocols available with the help of a literature survey. It also deals with two protocols using different processes and types of TTPs and proposes an improved version of each by overcoming certain limitations. Through analysis and comparisons this book tries to establish that the proposed protocols are actually enhanced as compared to their predecessors.