1 조중기, "정보보호 관리체계 인증 취득 후 기업가치의 변화에 관한 연구" 한국융합학회 7 (7): 237-247, 2016
2 김현성, "개도국의 공개키기반구조 도입 전략에 관한 연구: 말라위를 중심으로" 한국디지털정책학회 14 (14): 45-51, 2016
3 W. Lam, "ZBarriers to e-government integration" 18 (18): 511-530, 2005
4 C. Marufu, "Utilisation of mobile health by medical doctors in a Zimbabwean health care facility" 22 : 228-234, 2017
5 A. Jansen, "The nature of public e-services and their quality dimensions" 33 : 647-657, 2016
6 Z. Li, "The E-government Information Model Based on GPR" 33 (33): 291-304, 2016
7 European Parliament, "Security of eGovernment System Final Report, Science and Technology Options Assessment" 2013
8 S. Hong, "Research on Wireless Sensor Networks Security Attack and Countermeasures : Survey" 4 (4): 1-6, 2014
9 NIST, "Recommendation for Key Management Part 3:Application-Specific Key Management Guidance"
10 C. E. V. Madhavan, "Recent Trends in Applied Cryptology" 20 (20): 119-128, 2003
1 조중기, "정보보호 관리체계 인증 취득 후 기업가치의 변화에 관한 연구" 한국융합학회 7 (7): 237-247, 2016
2 김현성, "개도국의 공개키기반구조 도입 전략에 관한 연구: 말라위를 중심으로" 한국디지털정책학회 14 (14): 45-51, 2016
3 W. Lam, "ZBarriers to e-government integration" 18 (18): 511-530, 2005
4 C. Marufu, "Utilisation of mobile health by medical doctors in a Zimbabwean health care facility" 22 : 228-234, 2017
5 A. Jansen, "The nature of public e-services and their quality dimensions" 33 : 647-657, 2016
6 Z. Li, "The E-government Information Model Based on GPR" 33 (33): 291-304, 2016
7 European Parliament, "Security of eGovernment System Final Report, Science and Technology Options Assessment" 2013
8 S. Hong, "Research on Wireless Sensor Networks Security Attack and Countermeasures : Survey" 4 (4): 1-6, 2014
9 NIST, "Recommendation for Key Management Part 3:Application-Specific Key Management Guidance"
10 C. E. V. Madhavan, "Recent Trends in Applied Cryptology" 20 (20): 119-128, 2003
11 J. Kim, "Public trust in a mobile device and service policy in South Korea : The Mobile Device Distribution Improvement Act" 34 : 540-547, 2017
12 H. Jin, "Proactive certificate validation for VANETs" IEEE 1-4, 2016
13 H. Kim, "Privacy Preserving Security Framework for Cognitive Radio Networks" 30 (30): 142-148, 2013
14 B. Payne, "PKI at Scale using Short-lived Certificates" 2016
15 OMB, "OMB Procedures and Guidance on Implementing the Government Paperwork Elimination Act"
16 Informata, "Mobilizing public services in Africa:The m-government challenges" 1-12, 2001
17 D. Kang, "Mobile services with handset bundling and governmental policies for competitive market" 34 : 323-337, 2017
18 I. Marin, "Improved M-Government based on Mobile WiMAX" 37-42, 2017
19 "IETF RFC 3280(2002) Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile"
20 J. Rowley, "How Short-Lived Certificates Improve Certificate Trust"
21 United Nations, "Global E-Government Readiness Report 2005" 2005
22 NIST, "Federal Agency Use of Public Key Technology for Digital Signatures and Authentication"
23 National Institute of Standards and Technology, "Federal Agency Use of Public Key Technology for Digital Signatures and Authentication"
24 M. Z. I. Lallmahomed, "Factors influencing the adoption of e-Government services in Maturittius" 34 (34): 57-72, 2017
25 Solution Profile-U.S. Federal Bridge Certification Authority (FBCA), "European Federated Validation Service Study" 2009
26 B. Klievink, "Digital Strategies in Action-a Comparative Analysis of National Data Infrastructure Development" ACM 129-138, 2017
27 Y. Lee, "Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce" 30 : 893-903, 2007
28 "DFN-PKI Certificate Policy – Security levels: Global, Classic and Basic"
29 S. H. Lee, "Cloud computing Issues and Security measure" 5 (5): 31-35, 2015
30 J. Poushter, "Cell Phones in Africa:Communication Lifeline-Texting Most Common Activity, but Mobile Money Popular in Several Countries" Pew Research Center 2015
31 W. Shanks, "Building and managing a PKI solution for small and medium size business" The SANS Institute 2013
32 I. K. Rohman, "Against the Shadow:the Role of e-Government" ACM 319-328, 2017
33 S. F. Verkijika, "A usability assessment of e-government websites in Sub-Saharan Africa" 39 : 20-29, 2018
34 A. Das, "A longitudinal study of e-government maturity" 53 : 415-426, 2017