DocumentCode :
3025463
Title :
The Exploitation of Electronic Government Administration System Applied to Submission
Author :
Li Jianshe
Author_Institution :
Coll. of Sci., Yanshan Univ., Qinhuangdao, China
fYear :
2010
fDate :
23-24 Oct. 2010
Firstpage :
390
Lastpage :
392
Abstract :
To construct the frame of the Electronic Government administration system according to submitting and demanding. The main security demanding of the system is analyzed, and digital signature and encryption techniques are used to construct a model to solve these security problems.
Keywords :
cryptography; digital signatures; government data processing; digital signature; electronic government administration system; encryption; security; Cryptography; Databases; Education; Electronic government; Internet; Materials; digital signature; electronic government; encryption techniques; security demand;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cryptography and Network Security, Data Mining and Knowledge Discovery, E-Commerce & Its Applications and Embedded Systems (CDEE), 2010 First ACIS International Symposium on
Conference_Location :
Qinhuangdao
Print_ISBN :
978-1-4244-9595-5
Type :
conf
DOI :
10.1109/CDEE.2010.82
Filename :
5759315
Link To Document :
بازگشت