Browse > Article
http://dx.doi.org/10.6109/jkiice.2014.18.1.11

Proposed that Application of the Security Algorithm for Implement Smart m-Gov  

Rim, Kwang-Cheol (Department of Mathmatics, Chosun University)
Choung, Young-Chul (Department of Computer Engineering, Chosun University)
Abstract
As ICT Ecosystem does, electronic government changes in its form. Accordingly, in order to realize Smarter m-Gov, the governments need to vitalize m-Gov services and enact technology policy. Therefor, this manuscript suggests possible model of m-Gov realization and security algorithm as a technology policy which applies quantum cryptography system to server security for the construction of secured m-Gov's infrastructure. What the manuscript suggests seeks administrative ideas of Smarter m-Gov's services which contain security, stability, and economic feasibility for the benefits of nation and enterprises.
Keywords
ICT Ecosystem; Mobile Government(m-Gov); Smart Government; Quantum Plaintext Transport;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Gartner, Gartner Says Smartphone Sales Accounted for 55 Percent of Overall Mobile Phone Sales in Third Quarter of 2013 ; Barcelona, Spain, November 14, 2013. Available: http://www.gartner.com/newsroom/id/2623415?fnl=search
2 Y. C Choung, Y. G Bae, "m-Gov Strategy and Policy Challenges ICT Ecosystem Changes," Journal of the Korea Institute of Information and Communication Engineering, vol. 17, no. 7, pp. 1532-1536, July. 2013.   과학기술학회마을   DOI   ScienceOn
3 H. R Kang, Others. "Mobile broadband and mobile biz model," KISDI: Basic Research 12-7, pp. 157-158, Dec. 2012.
4 Government Strategy Seminar based on Smart phone, "e-government(M-Gov) Policy Direction according to Spread of mobile," Ministry of Security and Public Administration, Republic of Korea: Jun. 2010.
5 Y. C Choung, Y. G Bae, "Research of convergence application services in u-Gov," Journal of the Korea Institute of Information and Communication Engineering, vol. 11, no. 6, pp. 1048, Jun. 2007.
6 M. Y Lee, Other. Network Security Technology of Next Generation, Life & Power Press, 2004.
7 L. Nuaymi(c), "Possible Research Axis in Radio Resource Management," Telecom Bretagne, Rennes, Lisbon: pp.13, Feb. 2008.
8 C. S Park, "Security measures for implementat of Secure mobile service," Government Strategy Seminar based on Smart phone, Seoul Womens University, Republic of Korea: Jun. 2010.
9 J. Z Seol, K. C Rim, "Using Double Photon Transmission of Quantum Cryptography, "Journal of the Korea Institute of Information and Communication Engineering, vol. 17, no. 8, pp. 1859-1863, August. 2013.   과학기술학회마을   DOI   ScienceOn