Subscribe Now Subscribe Today
Science Alert
Curve Top
Asian Journal of Scientific Research
  Year: 2013 | Volume: 6 | Issue: 4 | Page No.: 632-649
DOI: 10.3923/ajsr.2013.632.649
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review

M.A. Watari, A.A. Zaidan and B.B. Zaidan

Several changes have taken place in the field of communication technologies (ICT) in recent years, specifically in the era of rapid technology development. Mobile technologies, especially smart phones, have replaced computers in various significant tasks. This development influenced the interactions between citizens and government agencies in m-Government. m-Government is an extension of e-Government, which provides services to citizens in general or to subscribers in particular. These services range from public to private bodies and the data transmitted sometimes require authentication and confidentiality. Thus, the need for data security is inevitable. This study will discuss the security of m-Government using security algorithms and report some literature work in this field to highlight its weaknesses.
PDF Fulltext XML References Citation Report Citation
  •    Modeling the Asymmetric in Conditional Variance
  •    Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview
  •    Secure Topology for Electronic Medical Record Transmissions
  •    Suitability of Using SOAP Protocol to Secure Electronic Medical Record Databases Transmission
  •    A Review on Multimedia Communications Cryptography
How to cite this article:

M.A. Watari, A.A. Zaidan and B.B. Zaidan, 2013. Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review. Asian Journal of Scientific Research, 6: 632-649.

DOI: 10.3923/ajsr.2013.632.649






Curve Bottom