• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Asian Journal of Scientific Research
  2. Vol 6 (4), 2013
  3. 632-649
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Asian Journal of Scientific Research

Year: 2013 | Volume: 6 | Issue: 4 | Page No.: 632-649
DOI: 10.3923/ajsr.2013.632.649

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 600

Search


Authors


M.A. Watari

Country: Malaysia

A.A. Zaidan

Country: Malaysia

B.B. Zaidan

Country: Malaysia

Keywords


  • symmetric algorithm
  • asymmetric algorithm
  • M-Government
Review Article

Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review

M.A. Watari, A.A. Zaidan and B.B. Zaidan
Several changes have taken place in the field of communication technologies (ICT) in recent years, specifically in the era of rapid technology development. Mobile technologies, especially smart phones, have replaced computers in various significant tasks. This development influenced the interactions between citizens and government agencies in m-Government. m-Government is an extension of e-Government, which provides services to citizens in general or to subscribers in particular. These services range from public to private bodies and the data transmitted sometimes require authentication and confidentiality. Thus, the need for data security is inevitable. This study will discuss the security of m-Government using security algorithms and report some literature work in this field to highlight its weaknesses.
PDF Fulltext XML References Citation

How to cite this article

M.A. Watari, A.A. Zaidan and B.B. Zaidan, 2013. Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review. Asian Journal of Scientific Research, 6: 632-649.

DOI: 10.3923/ajsr.2013.632.649

URL: https://scialert.net/abstract/?doi=ajsr.2013.632.649

Related Articles

Modeling the Asymmetric in Conditional Variance
Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview
Secure Topology for Electronic Medical Record Transmissions
Suitability of Using SOAP Protocol to Secure Electronic Medical Record Databases Transmission
A Review on Multimedia Communications Cryptography
Plagiarized: An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved