Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
International Journal of Trust Management in Computing and Communications
Title
Publication Date
Language
Citations
A hybrid technique to secure fingerprint templates using Delaunay neighbour structures
2016/01/01
English
Secure delegation of services through proxy signature with revocation
2016/01/01
English
CEAT: a cloud evidence acquisition tool for aiding forensic investigations in cloud systems
2016/01/01
English
A new proposal for trust management in wireless sensor networks based on validation
2017/01/01
English
A deterministic key pre-distribution scheme for WSN using projective planes and their complements
2014/01/01
English
A trust-based AODV routing protocol for improved QoS in mobile ad-hoc networks
2014/01/01
English
Identity business processes
2014/01/01
English
A privacy enabling content distribution framework for digital rights management
2014/01/01
English
Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks
2014/01/01
English
Editorial article: On the boundaries of trust and security in computing and communications systems
2014/01/01
English
Role of parameter adaptation in chaotic communication
2015/01/01
English
A user oriented cloud security evaluation framework
2015/01/01
English
A theoretical framework for trust management in vehicular ad hoc networks
2015/01/01
English
HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack
2015/01/01
English
Trust evaluation using fuzzy proximity relation with ordering for MANET
2013/01/01
English
Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation
2013/01/01
English
A novel linear polynomial-based dynamic key management scheme for hierarchical access control
2013/01/01
English
Simulating a trust-based service recommender system for decentralised user modelling environment
2013/01/01
English
Trust integrated node potential aware routing for WSNs
2014/01/01
English
Agent-based approach for identity and access management in the inter-cloud environments
2014/01/01
English
Security automaton to mitigate laser-based fault attacks on smart cards
2014/01/01
English
An access control model for cloud-based EMR federation
2014/01/01
English
Improved recovery probability of mobile hosts using energy and mobility-based secure checkpointing-recovery
2014/01/01
English
I-SLASS: an improved login approach over SLASS
2014/01/01
English
Computationally perfect compartmented secret sharing schemes based on MDS codes
2014/01/01
English
Development of a reliable trust management model in social internet of things
2014/01/01
English
Analysis and modelling of semantic attacks in online social networks
2014/01/01
English
A survey on user access control in wireless sensor networks with formal security verification
2014/01/01
English
Hand vein authentication system using connected minutiae neighbours
2014/01/01
English
Enhanced t-closeness for balancing utility and privacy
2013/01/01
English
«
‹ Pervious
Next ›
»