1 |
I. K. Rohman & L. Veiga. (2017). Against the Shadow: the Role of e-Government, in Proc. of the 18th Annual International Conference on Digital Government Research, (pp. 319-328). New York : ACM.
|
2 |
A. Das, H. Singh & D. Joseph. (2017). A longitudinal study of e-government maturity.Information & Management, 53, 415-426.
|
3 |
H. Kim & H. Choi. (2016). Research on Deployment Strategy of Public Key Infrastructure for Developing Country: Focused on Malawi. Journal of Digital Convergence, 14(10), 45-51.
DOI
|
4 |
J. Jo & S. Choi. (2016). Firm's Market Value Trends after Information Security Management System(ISMS) Cerficiation Acquisition. Journal of the Korea Convergence Society, 7(6), 237-247.
DOI
|
5 |
D. Kang, M. J. Park, D. H. Lee & J. J. Rho. (2017). Mobile services with handset bundling and governmental policies for competitive market. Telematics and Informatics, 34, 323-337.
DOI
|
6 |
A. Jansen & S. Olnes. (2016). The nature of public e-services and their quality dimensions, Government Information Quarterly, 33, 647-657.
DOI
|
7 |
C. E. V. Madhavan & P. K. Saxena. (2003). Recent Trends in Applied Cryptology. IETE Technical Review, 20(2), 119-128.
DOI
|
8 |
National Institute of Standards and Technology. (2000). Federal Agency Use of Public Key Technology for Digital Signatures and Authentication.
|
9 |
Solution Profile-U.S. Federal Bridge Certification Authority (FBCA), European Federated Validation Service Study, 2009.
|
10 |
DFN-PKI Certificate Policy - Security levels: Global, Classic and Basic, Deutsches Forschungsnetz, 2006.
|
11 |
J. Kim, S. Park, H. Cho, J. Kim & J. Y. Choi. (2017). Public trust in a mobile device and service policy in South Korea: The Mobile Device Distribution Improvement Act. Telematics and Informatics, 34, 540-547.
DOI
|
12 |
Z. Li & F. Yang. (2016). The E-government Information Model Based on GPR. Government Information Quarterly, 33(2), 291-304.
DOI
|
13 |
W. Lam. (2005). ZBarriers to e-government integration, Journal of Enterprise Information Management, 18(5), 511-530.
DOI
|
14 |
Informata. (2001). Mobilizing public services in Africa: The m-government challenges, 1-12.
|
15 |
J. Poushter & R. Oates. (2015). Cell Phones in Africa: Communication Lifeline-Texting Most Common Activity, but Mobile Money Popular in Several Countries, Pew Research Center.
|
16 |
S. F. Verkijika & L. D. Wet. (2018). A usability assessment of e-government websites in Sub-Saharan Africa. International Journal of Information Management, 39, 20-29.
DOI
|
17 |
M. Z. I. Lallmahomed, N. Lallmahomed & G. M. Lallmahomed. (2017). Factors influencing the adoption of e-Government services in Maturittius. Telematics and Informatics, 34(4), 57-72.
DOI
|
18 |
United Nations. (2005). Global E-Government Readiness Report 2005.
|
19 |
OMB Memorandum M-00-10. (2000). OMB Procedures and Guidance on Implementing the Government Paperwork Elimination Act,
|
20 |
European Parliament. (2013). Security of eGovernment System Final Report, Science and Technology Options Assessment, IP/A/STOA/FWC/2008-096/LOT4/C1/SC10.
|
21 |
I. Marin, N. A. J. Al-Habeeb, N. Goga, A. Vasilateanu, I. Pavaloiu & C. Boiangiu. (2017). Improved M-Government based on Mobile WiMAX, in Proc. of 2017 21st International Conference on Control Systems and Computer Science, Bucharest, Romania, 37-42.
|
22 |
S. Hong. (2014). Research on Wireless Sensor Networks Security Attack and Countermeasures: Survey. Journal of Convergence for Information Technology. 4(4), 1-6.
DOI
|
23 |
H. Jin & P. Papadimitratos. (2016). Proactive certificate validation for VANETs, in Proc. of 2016 IEEE Vehicular Networking Conference, (pp.1-4). USA: IEEE.
|
24 |
H. Kim. (2013). Privacy Preserving Security Framework for Cognitive Radio Networks. IETE Technical Review, 30(2), 142-148.
DOI
|
25 |
S. H. Lee. (2015). Cloud computing Issues and Security measure. Journal of Convergence for Information Technology, 5(1), 31-35.
DOI
|
26 |
NIST Special Publication 800-57. (2013). Recommendation for Key Management Part 3: Application-Specific Key Management Guidance.
|
27 |
W. Shanks & H. Khiabani. (2013). Building and managing a PKI solution for small and medium size business, The SANS Institute.
|
28 |
B. Payne. (2016). PKI at Scale using Short-lived Certificates, in Proc. of USENIX Enigma 2016, San Francisco, CA.
|
29 |
J. Rowley. (2016). How Short-Lived Certificates Improve Certificate Trust, Digicert blog, https://blog.digicert.com/short-lived-certificates/.
|
30 |
IETF RFC 3280. (2002). Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile.
|
31 |
NIST Special Publication 800-25. (2000). Federal Agency Use of Public Key Technology for Digital Signatures and Authentication.
|
32 |
Y. Lee, J. Lee & J. Song. (2007). Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce. Computer Communications, 30, 893-903.
DOI
|
33 |
C. Marufu & K. A. Maboe. (2017). Utilisation of mobile health by medical doctors in a Zimbabwean health care facility. Health SA Gesondheid, 22, 228-234.
DOI
|
34 |
B. Klievink, A. Neuroni, M. Fraefel & A. Zuiderwijk. (2017). Digital Strategies in Action-a Comparative Analysis of National Data Infrastructure Development, in Proc. of the 18th Annual International Conference on Digital Government Research, (pp. 129-138). New York : ACM.
|