CALIFORNIA STATE UNIVERSITY, NORTHRIDGE E-Governance and its Associated Cybersecurity: The Challenges and Best Practices of Auth Page 1 CALIFORNIA STATE …
M Kumar, KS Vaisla - … Conference on Advances in Computing and …, 2014 - researchgate.net
Communication Technology (ICT) produce the noticeable benefits of the country. The effective model of e-Authentication framework for e-Governance can make the secure e …
Electronic authentication (aka e-Authentication) is the process of establishing confidence in a user's identity electronically presented to an information system. In today's world of …
E Pimenidis, I Savvas - International Journal of Electronic …, 2007 - inderscienceonline.com
The EU commission has set the Pan-European Interoperability of secure authentication and authorisation systems for access to e-government services as a priority target for 2010. To …
A Roy, S Karforma - Emerging Mobile and Web 2.0 Technologies for …, 2014 - igi-global.com
In the current climate of global economic decline, the developing countries are facing severe challenges in maintaining an efficient administration within an affordable budget. If this …
H Almagwashi, A Gray - The 5th International Conference on e …, 2009 - researchgate.net
Electronic government security is one of the major obstacles facing the deployment of e- government projects around the world. A fundamental aspect of e-government security is …
I Iglezakis - Available at SSRN 2690374, 2015 - papers.ssrn.com
A key aspect of eGovernment is identity management, since the processes that are involved in the provision of public services rely profoundly on secure identification policies; it presents …
E Nardelli, S Posadziejewski, M Talamo - 2003 - books.google.com
This volume contains the final proceedings of the special stream on security in E- government and E-business. This stream has been an integral part of the IFIP World …
N Kübler - Communication Systems XIV, 2021 - files.ifi.uzh.ch
Numerous countries use electronic identities to provide E-Government services to their residents. The fundamental problem is: how to prove that an Internet user is whom she …