Securing m-government transmission based on symmetric and asymmetric algorithms: A review

Several changes have taken place in the field of communication technologies (ICT) in recent years, specifically in the era of rapid technology development. Mobile technologies, especially smart phones, have replaced computers in various significant tasks. This development influenced the interactions...

Full description

Saved in:
Bibliographic Details
Main Authors: Watari M.A., Zaidan A.A., Zaidan B.B.
Other Authors: 55821064700
Format: Article
Published: 2023
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-29378
record_format dspace
spelling my.uniten.dspace-293782023-12-28T12:12:49Z Securing m-government transmission based on symmetric and asymmetric algorithms: A review Watari M.A. Zaidan A.A. Zaidan B.B. 55821064700 35070838500 35070872100 Asymmetric algorithm M-Government Symmetric algorithm Several changes have taken place in the field of communication technologies (ICT) in recent years, specifically in the era of rapid technology development. Mobile technologies, especially smart phones, have replaced computers in various significant tasks. This development influenced the interactions between citizens and government agencies in m-Government. m-Government is an extension of e-Government, which provides services to citizens in general or to subscribers in particular. These services range from public to private bodies and the data transmitted sometimes require authentication and confidentiahty. Thus, the need for data security is inevitable. This study will discuss the security of m-Government using security algorithms and report some literature work in this field to highlight its weaknesses. � 2013 Asian Network for Scientific Information. Final 2023-12-28T04:12:49Z 2023-12-28T04:12:49Z 2013 Article 10.3923/ajsr.2013.632.649 2-s2.0-84881482247 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84881482247&doi=10.3923%2fajsr.2013.632.649&partnerID=40&md5=d26ef83d9177381a13a027fa8d6a6ea3 https://irepository.uniten.edu.my/handle/123456789/29378 6 4 632 649 All Open Access; Bronze Open Access Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
topic Asymmetric algorithm
M-Government
Symmetric algorithm
spellingShingle Asymmetric algorithm
M-Government
Symmetric algorithm
Watari M.A.
Zaidan A.A.
Zaidan B.B.
Securing m-government transmission based on symmetric and asymmetric algorithms: A review
description Several changes have taken place in the field of communication technologies (ICT) in recent years, specifically in the era of rapid technology development. Mobile technologies, especially smart phones, have replaced computers in various significant tasks. This development influenced the interactions between citizens and government agencies in m-Government. m-Government is an extension of e-Government, which provides services to citizens in general or to subscribers in particular. These services range from public to private bodies and the data transmitted sometimes require authentication and confidentiahty. Thus, the need for data security is inevitable. This study will discuss the security of m-Government using security algorithms and report some literature work in this field to highlight its weaknesses. � 2013 Asian Network for Scientific Information.
author2 55821064700
author_facet 55821064700
Watari M.A.
Zaidan A.A.
Zaidan B.B.
format Article
author Watari M.A.
Zaidan A.A.
Zaidan B.B.
author_sort Watari M.A.
title Securing m-government transmission based on symmetric and asymmetric algorithms: A review
title_short Securing m-government transmission based on symmetric and asymmetric algorithms: A review
title_full Securing m-government transmission based on symmetric and asymmetric algorithms: A review
title_fullStr Securing m-government transmission based on symmetric and asymmetric algorithms: A review
title_full_unstemmed Securing m-government transmission based on symmetric and asymmetric algorithms: A review
title_sort securing m-government transmission based on symmetric and asymmetric algorithms: a review
publishDate 2023
_version_ 1806424477110632448
score 13.18916