Publication:
Securing m-government transmission based on symmetric and asymmetric algorithms: A review

dc.citedby3
dc.contributor.authorWatari M.A.en_US
dc.contributor.authorZaidan A.A.en_US
dc.contributor.authorZaidan B.B.en_US
dc.contributor.authorid55821064700en_US
dc.contributor.authorid35070838500en_US
dc.contributor.authorid35070872100en_US
dc.date.accessioned2023-12-28T04:12:49Z
dc.date.available2023-12-28T04:12:49Z
dc.date.issued2013
dc.description.abstractSeveral changes have taken place in the field of communication technologies (ICT) in recent years, specifically in the era of rapid technology development. Mobile technologies, especially smart phones, have replaced computers in various significant tasks. This development influenced the interactions between citizens and government agencies in m-Government. m-Government is an extension of e-Government, which provides services to citizens in general or to subscribers in particular. These services range from public to private bodies and the data transmitted sometimes require authentication and confidentiahty. Thus, the need for data security is inevitable. This study will discuss the security of m-Government using security algorithms and report some literature work in this field to highlight its weaknesses. � 2013 Asian Network for Scientific Information.en_US
dc.description.natureFinalen_US
dc.identifier.doi10.3923/ajsr.2013.632.649
dc.identifier.epage649
dc.identifier.issue4
dc.identifier.scopus2-s2.0-84881482247
dc.identifier.spage632
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84881482247&doi=10.3923%2fajsr.2013.632.649&partnerID=40&md5=d26ef83d9177381a13a027fa8d6a6ea3
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/29378
dc.identifier.volume6
dc.pagecount17
dc.relation.ispartofAll Open Access; Bronze Open Access
dc.sourceScopus
dc.sourcetitleAsian Journal of Scientific Research
dc.subjectAsymmetric algorithm
dc.subjectM-Government
dc.subjectSymmetric algorithm
dc.titleSecuring m-government transmission based on symmetric and asymmetric algorithms: A reviewen_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections