International Journal of Trust Management in Computing and Communications

Titel Veröffentlichungsdatum Sprache Zitate
Simulating a trust-based service recommender system for decentralised user modelling environment2013/01/01English
Trust integrated node potential aware routing for WSNs2014/01/01English
Agent-based approach for identity and access management in the inter-cloud environments2014/01/01English
Security automaton to mitigate laser-based fault attacks on smart cards2014/01/01English
An access control model for cloud-based EMR federation2014/01/01English
Improved recovery probability of mobile hosts using energy and mobility-based secure checkpointing-recovery2014/01/01English
I-SLASS: an improved login approach over SLASS2014/01/01English
Computationally perfect compartmented secret sharing schemes based on MDS codes2014/01/01English
Development of a reliable trust management model in social internet of things2014/01/01English
Analysis and modelling of semantic attacks in online social networks2014/01/01English
A survey on user access control in wireless sensor networks with formal security verification2014/01/01English
Hand vein authentication system using connected minutiae neighbours2014/01/01English
Enhanced t-closeness for balancing utility and privacy2013/01/01English
Archimedean copula-based estimation of distribution algorithm for multi-objective optimisation2013/01/01English
Theory and implementation of a virtualisation level Future Internet defence in depth architecture2013/01/01English
Selective opportunistic routing based on QoS in wireless mesh network2013/01/01English
GTC: a geographical topology control protocol to conserve energy in wireless sensor networks2013/01/01English
A secure and privacy-preserving approach to communications in smart grids2016/01/01English
Multi-algorithmic fingerprint model for cancellable template generation2016/01/01English
Secured MPR node selection in the presence of cheating nodes2016/01/01English
Refining dependencies for information flow analysis of database applications2016/01/01English
Black hole attack detection and ignoring in OLSR protocol2017/01/01English
Intrusion detection in a trust-based recommendation system2017/01/01English
Trust computation in VANET using TOEFV2017/01/01English
An efficient and secure RSA-based certificateless signature scheme for wireless sensor networks2017/01/01English
Intrusion detection in a trust-based recommendation system2017/01/01English
A new proposal for trust management in wireless sensor networks based on validation2017/01/01English
An efficient and secure RSA-based certificateless signature scheme for wireless sensor networks2017/01/01English
Trust computation in VANET using TOEFV2017/01/01English
Black hole attack detection and ignoring in OLSR protocol2017/01/01English