References
- Mubarak S. Al-Mutairi. M-Government: Challenges and Key Success Factors - Saudi Arabia Case Study. pp 78-96
- Layne, K., & Lee, J. (2001). Developing fully functional e-government: A four stage model. Government Information Quarterly, 18, 122-136. doi:10.1016/S0740-624X(01)00066-1
- Kakihara, M., & Sorensen, C. (2002). Mobility: An Extended Perspective. 35th Hawaii International Conference on System Sciences, Hawaii, USA.
- Easton, J. (2002). Going Wireless: transform your business with wireless mobile technology. USA: HarperCollins.
- Kushchu, I., & Kuscu, H. (2003). From e-government to m-government: Facing the Inevitable? In the proceeding of European Conference on e-government (ECEG 2003), Trinity College, Dublin.
- Goldstuck, A. (2004). Government Unplugged: Mobile and wireless technologies in the public service. Center for public services innovation, South Africa.
- Kushchu I (2007) Mobile government: an emerging direction in e-government. Mobile Government Consortium International, UK. IGI Publishing
- Roy A, Banik S, Karforma S (2011) Object oriented modelling of RSA digital signature in e-governance security. Int J Comput Eng Inf Technol 26:24-33
- Roy A, Karforma S (2012) Object oriented approach of digital certificate based e-governance mechanism. ACEEE Conf Proc Ser 3:3-4
- Roy A, Karforma S (2013) UML based modeling of ECDSA for secured and smart E-Governance system. In Computer Science and Information Technology (CS and IT-CSCP 2013), Proceedings of National Conference on Advancement of Computing in Engineering Research (ACER13) organized by Global Institute of Management and Technology, pp 207-222. doi:10.5121/csit.2013.3219
- Burrows, M., Abadi, M. and Needham, R. (1989) 'A logic of authentication', Proceedings of the Royal Society of London A, February, Vol. 426, pp.233-271, A preliminary version appearedas Digital Equipment Corporation Systems Research Center report No.39.
- Burrows, M., Abadi, M. and Needham, R. (1990) 'A logic of authentication', ACM Transactions on Computer Systems, Vol. 8, No. 1, pp.18-36. https://doi.org/10.1145/77648.77649
- Yang, J.-H., Chang, Y.-F., & Chen, Y, "An efficient authenticated encryption scheme based on ecc and its application for electronic payment," Information Technology and Control, vol. 42, no. 4, pp 315-324, 2013.
- Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, and Vanga Odelu, "Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks," Security Comm. Networks, vol. 9, pp 5563-5580, 2017. https://doi.org/10.1002/sec.1717
- Jen-Ho Yang, Ya-Fen Chang, and Yi-Hui Chen, "An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment," Information Technology and Control, vol.42, No.4, 2013.