References
- A. Das, H. Singh & D. Joseph. (2017). A longitudinal study of e-government maturity.Information & Management, 53, 415-426.
- H. Kim & H. Choi. (2016). Research on Deployment Strategy of Public Key Infrastructure for Developing Country: Focused on Malawi. Journal of Digital Convergence, 14(10), 45-51. https://doi.org/10.14400/JDC.2016.14.10.45
- J. Jo & S. Choi. (2016). Firm's Market Value Trends after Information Security Management System(ISMS) Cerficiation Acquisition. Journal of the Korea Convergence Society, 7(6), 237-247. https://doi.org/10.15207/JKCS.2016.7.6.237
- D. Kang, M. J. Park, D. H. Lee & J. J. Rho. (2017). Mobile services with handset bundling and governmental policies for competitive market. Telematics and Informatics, 34, 323-337. https://doi.org/10.1016/j.tele.2016.04.015
- A. Jansen & S. Olnes. (2016). The nature of public e-services and their quality dimensions, Government Information Quarterly, 33, 647-657. https://doi.org/10.1016/j.giq.2016.08.005
- C. E. V. Madhavan & P. K. Saxena. (2003). Recent Trends in Applied Cryptology. IETE Technical Review, 20(2), 119-128. https://doi.org/10.1080/02564602.2003.11417076
- National Institute of Standards and Technology. (2000). Federal Agency Use of Public Key Technology for Digital Signatures and Authentication.
- Solution Profile-U.S. Federal Bridge Certification Authority (FBCA), European Federated Validation Service Study, 2009.
- DFN-PKI Certificate Policy - Security levels: Global, Classic and Basic, Deutsches Forschungsnetz, 2006.
- J. Kim, S. Park, H. Cho, J. Kim & J. Y. Choi. (2017). Public trust in a mobile device and service policy in South Korea: The Mobile Device Distribution Improvement Act. Telematics and Informatics, 34, 540-547. https://doi.org/10.1016/j.tele.2016.08.020
- W. Lam. (2005). ZBarriers to e-government integration, Journal of Enterprise Information Management, 18(5), 511-530. https://doi.org/10.1108/17410390510623981
- Informata. (2001). Mobilizing public services in Africa: The m-government challenges, 1-12.
- J. Poushter & R. Oates. (2015). Cell Phones in Africa: Communication Lifeline-Texting Most Common Activity, but Mobile Money Popular in Several Countries, Pew Research Center.
- S. F. Verkijika & L. D. Wet. (2018). A usability assessment of e-government websites in Sub-Saharan Africa. International Journal of Information Management, 39, 20-29. https://doi.org/10.1016/j.ijinfomgt.2017.11.003
- M. Z. I. Lallmahomed, N. Lallmahomed & G. M. Lallmahomed. (2017). Factors influencing the adoption of e-Government services in Maturittius. Telematics and Informatics, 34(4), 57-72. https://doi.org/10.1016/j.tele.2017.01.003
- Z. Li & F. Yang. (2016). The E-government Information Model Based on GPR. Government Information Quarterly, 33(2), 291-304. https://doi.org/10.1016/j.giq.2016.04.006
- United Nations. (2005). Global E-Government Readiness Report 2005.
- OMB Memorandum M-00-10. (2000). OMB Procedures and Guidance on Implementing the Government Paperwork Elimination Act,
- European Parliament. (2013). Security of eGovernment System Final Report, Science and Technology Options Assessment, IP/A/STOA/FWC/2008-096/LOT4/C1/SC10.
- I. Marin, N. A. J. Al-Habeeb, N. Goga, A. Vasilateanu, I. Pavaloiu & C. Boiangiu. (2017). Improved M-Government based on Mobile WiMAX, in Proc. of 2017 21st International Conference on Control Systems and Computer Science, Bucharest, Romania, 37-42.
- S. Hong. (2014). Research on Wireless Sensor Networks Security Attack and Countermeasures: Survey. Journal of Convergence for Information Technology. 4(4), 1-6. https://doi.org/10.22156/CS4SMB.2014.4.4.001
- NIST Special Publication 800-25. (2000). Federal Agency Use of Public Key Technology for Digital Signatures and Authentication.
- H. Kim. (2013). Privacy Preserving Security Framework for Cognitive Radio Networks. IETE Technical Review, 30(2), 142-148. https://doi.org/10.4103/0256-4602.110553
- S. H. Lee. (2015). Cloud computing Issues and Security measure. Journal of Convergence for Information Technology, 5(1), 31-35. https://doi.org/10.22156/CS4SMB.2015.5.1.031
- NIST Special Publication 800-57. (2013). Recommendation for Key Management Part 3: Application-Specific Key Management Guidance.
- W. Shanks & H. Khiabani. (2013). Building and managing a PKI solution for small and medium size business, The SANS Institute.
- B. Payne. (2016). PKI at Scale using Short-lived Certificates, in Proc. of USENIX Enigma 2016, San Francisco, CA.
- H. Jin & P. Papadimitratos. (2016). Proactive certificate validation for VANETs, in Proc. of 2016 IEEE Vehicular Networking Conference, (pp.1-4). USA: IEEE.
- J. Rowley. (2016). How Short-Lived Certificates Improve Certificate Trust, Digicert blog, https://blog.digicert.com/short-lived-certificates/.
- IETF RFC 3280. (2002). Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile.
- Y. Lee, J. Lee & J. Song. (2007). Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce. Computer Communications, 30, 893-903. https://doi.org/10.1016/j.comcom.2006.10.014
- C. Marufu & K. A. Maboe. (2017). Utilisation of mobile health by medical doctors in a Zimbabwean health care facility. Health SA Gesondheid, 22, 228-234. https://doi.org/10.1016/j.hsag.2017.03.002
- B. Klievink, A. Neuroni, M. Fraefel & A. Zuiderwijk. (2017). Digital Strategies in Action-a Comparative Analysis of National Data Infrastructure Development, in Proc. of the 18th Annual International Conference on Digital Government Research, (pp. 129-138). New York : ACM.
- I. K. Rohman & L. Veiga. (2017). Against the Shadow: the Role of e-Government, in Proc. of the 18th Annual International Conference on Digital Government Research, (pp. 319-328). New York : ACM.