International Journal of Trust Management in Computing and Communications

Title Publication Date Language Citations
Mitigating malicious feedback attacks in trust management systems2015/01/01English
An audio encryption technique through compressive sensing and Arnold transform2015/01/01English
Privacy landscape in online social networks2015/01/01English
An interdisciplinary approach to accountability for future internet service provision2013/01/01English
EDARD: efficient data access based on rumour dissemination in wireless sensor networks2013/01/01English
Privacy aware publication of surveillance video2013/01/01English
A trust model-based analysis of social networks2013/01/01English
Trust and context view-based knowledge sharing in MANets2013/01/01English
Caucus: an authentication protocol for cloud federation2018/01/01English
Personalised reconfigurable trust management2018/01/01English
Socio-cultural distrust of internet information2018/01/01English
Personalised recommendation system for ranking in question-answering websites with splay tree by avoiding tumbleweed badge2018/01/01English
A complete literature review on financial fraud detection applying data mining techniques2016/01/01English
A hybrid technique to secure fingerprint templates using Delaunay neighbour structures2016/01/01English
Secure delegation of services through proxy signature with revocation2016/01/01English
CEAT: a cloud evidence acquisition tool for aiding forensic investigations in cloud systems2016/01/01English
A new proposal for trust management in wireless sensor networks based on validation2017/01/01English
A deterministic key pre-distribution scheme for WSN using projective planes and their complements2014/01/01English
A trust-based AODV routing protocol for improved QoS in mobile ad-hoc networks2014/01/01English
Identity business processes2014/01/01English
A privacy enabling content distribution framework for digital rights management2014/01/01English
Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks2014/01/01English
Editorial article: On the boundaries of trust and security in computing and communications systems2014/01/01English
Role of parameter adaptation in chaotic communication2015/01/01English
A user oriented cloud security evaluation framework2015/01/01English
A theoretical framework for trust management in vehicular ad hoc networks2015/01/01English
HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack2015/01/01English
Trust evaluation using fuzzy proximity relation with ordering for MANET2013/01/01English
Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation2013/01/01English
A novel linear polynomial-based dynamic key management scheme for hierarchical access control2013/01/01English