2010 Second International Workshop on Education Technology and Computer Science 2010
DOI: 10.1109/etcs.2010.106
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of a Secure Scheme for the C/S Mode E-Government System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Another similar work in the same year was proposed by Feng [15], but instead of a centralised CA and a directorymanaged escrow, a client-server architecture was proposed to authenticate and validate users. In this architecture, users are required to provide a certificate to prove identity along with their private key.…”
Section: Previous Similar Workmentioning
confidence: 96%
See 4 more Smart Citations
“…Another similar work in the same year was proposed by Feng [15], but instead of a centralised CA and a directorymanaged escrow, a client-server architecture was proposed to authenticate and validate users. In this architecture, users are required to provide a certificate to prove identity along with their private key.…”
Section: Previous Similar Workmentioning
confidence: 96%
“…Furthermore, even though they provide session control based on access requests [2] [15], there is no way of preventing unauthorised access to the backend using the proposed models, unless audit trails are set on the database, and direct login requests to the back-end are detected.…”
Section: Previous Similar Workmentioning
confidence: 97%
See 3 more Smart Citations