International Journal of Trust Management in Computing and Communications

Title Publication Date Language Citations
A hybrid technique to secure fingerprint templates using Delaunay neighbour structures2016/01/01English
Secure delegation of services through proxy signature with revocation2016/01/01English
CEAT: a cloud evidence acquisition tool for aiding forensic investigations in cloud systems2016/01/01English
A new proposal for trust management in wireless sensor networks based on validation2017/01/01English
A deterministic key pre-distribution scheme for WSN using projective planes and their complements2014/01/01English
A trust-based AODV routing protocol for improved QoS in mobile ad-hoc networks2014/01/01English
Identity business processes2014/01/01English
A privacy enabling content distribution framework for digital rights management2014/01/01English
Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks2014/01/01English
Editorial article: On the boundaries of trust and security in computing and communications systems2014/01/01English
Role of parameter adaptation in chaotic communication2015/01/01English
A user oriented cloud security evaluation framework2015/01/01English
A theoretical framework for trust management in vehicular ad hoc networks2015/01/01English
HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack2015/01/01English
Trust evaluation using fuzzy proximity relation with ordering for MANET2013/01/01English
Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation2013/01/01English
A novel linear polynomial-based dynamic key management scheme for hierarchical access control2013/01/01English
Simulating a trust-based service recommender system for decentralised user modelling environment2013/01/01English
Trust integrated node potential aware routing for WSNs2014/01/01English
Agent-based approach for identity and access management in the inter-cloud environments2014/01/01English
Security automaton to mitigate laser-based fault attacks on smart cards2014/01/01English
An access control model for cloud-based EMR federation2014/01/01English
Improved recovery probability of mobile hosts using energy and mobility-based secure checkpointing-recovery2014/01/01English
I-SLASS: an improved login approach over SLASS2014/01/01English
Computationally perfect compartmented secret sharing schemes based on MDS codes2014/01/01English
Development of a reliable trust management model in social internet of things2014/01/01English
Analysis and modelling of semantic attacks in online social networks2014/01/01English
A survey on user access control in wireless sensor networks with formal security verification2014/01/01English
Hand vein authentication system using connected minutiae neighbours2014/01/01English
Enhanced t-closeness for balancing utility and privacy2013/01/01English