[1] J. D. Twizeyimana and A. Andersson, "The public value of E-Government–A literature review," Government information quarterly, vol. 36, no. 2, pp. 167-178, 2019.
[3] S. R. Chohan, and G. Hu, "Strengthening digital inclusion through e-government: Cohesive ICT training programs to intensify digital competency. Information technology for development", vol. 28, no.1,pp.16-38, 2022.
[4] K. E. Markantonakis, and M. Konstantinos, "Smarty Cards/Tokens Security and Applications," University of London International Academy, vol. I, no. 5, pp. 55-60, ۲۰۰۷.
[5] Hendry, Mike. "Multi-application smart cards: technology and applications". Cambridge university press, 2007.
[6] J. I. den Hartog, and E. P. de Vink, "Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards," Springer, vol. i, no. 14, p. 26, 2005.
[7] Rohatgi, Paul Kocher, Joshua Jaffe, Benjamin Jun, Pankaj, "Introduction to differential power analysis," Springer, vol. 1, no. 5, pp. 5-27, 2010.
[8] M. Neve, E. Peeters, D. Samyde, and J. Quisquater, "Memories: a survey of their secure uses in smart cards," ieee, vol. i, no. 13, pp. 1-10, 2003.
[9] L. Rivie`re, Julien Bringer, T. Ha Le, and H. Chabanne, "A Novel Simulation Approach for Fault Injection Resistance Evaluation on Smart cards," IEEE, vol. i, no. 12, pp. 1-8, 2015.
[10] B. Fouladi, Konstantinos Markantonakis and Keith Mayes, "Vulnerability Analysis of a Commercial .NET Smart Card," ieee, vol. II, no. 12, pp. 1-15, 2014.
[11] Shostack, Adam. Threat modeling: Designing for security. John Wiley & Sons, 2014.
[12] Mahanta, Hridoy Jyoti, Abul Kalam Azad, and Ajoy Kumar Khan. "Power analysis attack: A vulnerability to smart card security." In 2015 International Conference on Signal Processing and Communication Engineering Systems, pp. 506-510. IEEE, 2015.
[13] P. Hsieh-Tsen, H. W. Yang, and M. S. Hwang, "An enhanced secure smart card-based password authentication scheme." Int. J. Netw. Secur. 22, no. 2. pp. 358-363, 2020.
[14] H. Zhang and M. Li, "Security Vulnerabilities of An Remote Password Authentication Scheme with Smart Card," IEEE, vol. 3, no. 4, pp. 1-4, 2010.
[14] V. Singh, P. Dahiya, and S. Singh, "Smart Card Based Password Authentication and User Anonymity Scheme using ECC and Steganography," ieee, vol. II, no. 6, pp. 1-8, 2014.
[15]M. A. Nor Fazlina, N. Z. Abd Hashim, and H. Chizari, "Security Issues in ATM Smart Card Technology," International Journal of Mathematics and Computational Science, vol. I, no. 4, pp. 199-205, 2015.
[16] کاظمی آشتیانی، رسول، خادم، بهروز، یک پروتکل احراز اصالت دوسویه در کارت هوشمند، نشریه علمی پدافند غیرعامل، دوره 3، شماره 3، شهریور 1391.
[17] ترابی، میترا، شهیدی نژاد، علی، یک طبقهبندی از حملات تزریق SQL و روشهای دفاع از این حملات در پدافند غیرعامل، نشریه علمی پدافند غیرعامل، دوره 9، شماره 3، صص 117-101، شهریور 1397. DOR: 20.1001.1.20086849.1397.9.3.10.9