ISIJ 15: e-Government and Security of Information

I&S 15: e-Government and Security of Information-1

I&S 15: e-Government and Security of Information-2

This volume examines the challenges related to security of information in E-Government with case studies from Taiwan, Thailand, and Indonesia, looking at policies and their implication, development of PKI infrastructure, secure e-mail application software for government, and e-voting. Another group of articles treats issues such as user authentication and encryption in e-Government, use of smart card technology, enhanced electronic password protection schemes, spam filter technology, security of digital images, and medical information security systems.

 

 

Editorial

Editorial. "E-Government and Security of Information." Information & Security: An International Journal 15, no. 1 (2004): 5-6.

Reviewed articles

Hwang, Min-Shiang, Chun-Ta Li, Jau-Ji Shen, and Yen-Ping Chu. "Challenges in E-Government and Security of Information." Information & Security: An International Journal 15, no. 1 (2004): 9-20.
Krairit, Poondej, Worraya Choomongkol, and Donyaprueth Krairit. "Strategic and Technology Policy Implications for E-Government." Information & Security: An International Journal 15, no. 1 (2004): 21-35.
OU, Chung-Ming, Chuan-Te HO, and Hwai-Ling Shan. "Government PKI Deployment and Usage in Taiwan." Information & Security: An International Journal 15, no. 1 (2004): 39-54.
CHEN, Yi-Hui, and Eric Jui- Lin LU. "Design of a Secure Fine-Grained Official Document Exchange Model for E-Government." Information & Security: An International Journal 15 (2004): 55-71.
Chang, Ya-Fen, and Chin-Chen Chang. "An Efficient and Practical Remote User Authentication Scheme." Information & Security: An International Journal 15, no. 1 (2004): 75-88.
Chan, Chao-Wen, and Chin-Chen Chang. "A Novel Lower Cost Crypto-Scheme Based on the Theory of Sharing Secrets." Information & Security: An International Journal 15, no. 1 (2004): 89-109.
Surendro, Kridanto, and Setiyo Cahyono. "Secure e-Mail Application Software for Government in Indonesia." Information & Security: An International Journal 15, no. 2 (2004): 135-150.
Orfila, Agustin, Javier Carbo, and Arturo Ribagorda. "Decision Model Analysis for Spam." Information & Security: An International Journal 15, no. 2 (2004): 151-161.
Zhan, Justin, Li-Wu Chang, and Stan Matwin. "Privacy-Preserving Electronic Voting." Information & Security: An International Journal 15 (2004): 165-180.
Yang, Chou-Chen, Ching-Ying Lin, and Hung-Wen Yang. "Improved Anonymous Secure e-Voting over a Network." Information & Security: An International Journal 15, no. 2 (2004): 181-195.
Wu, Hsien-Chu, Chwei-Shyong Tsai, and Ching-Hao Lai. "A License Plate Recognition System in e-Government." Information & Security: An International Journal 15, no. 2 (2004): 199-210.
Tu, Shu-Fen, and Ching-Sheng Hsu. "A BTC-Based Watermarking Scheme for Digital Images." Information & Security: An International Journal 15, no. 2 (2004): 216-228.

ISIJ Monitor

Monitor, ISIJ. "E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES." Information & Security: An International Journal 15, no. 1 (2004): 117-127.
Monitor, ISIJ. "E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES." Information & Security: An International Journal 15, no. 2 (2004): 231-255.
Share/Save