default search action
International Journal of Trust Management in Computing and Communications, Volume 3
Volume 3, Number 1, 2015
- Soon-Keow Chong, Jemal H. Abawajy:
Mitigating malicious feedback attacks in trust management systems. 1-18 - Agrima Srivastava, G. Geethakumari:
Privacy landscape in online social networks. 19-39 - V. Geetha, K. Chandrasekaran:
TFSR: trust factors evaluation-based secure routing protocol for wireless sensor network. 40-73 - Nishanth Augustine, Sudhish N. George, Deepthi P. Pattathil:
An audio encryption technique through compressive sensing and Arnold transform. 74-92
Volume 3, Number 2, 2015
- Nilesh Chakraborty, Samrat Mondal:
HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack. 93-114 - Arti Dwivedi, Ashok Kumar Mittal, Suneet Dwivedi:
Role of parameter adaptation in chaotic communication. 115-146 - Jared Oluoch:
A theoretical framework for trust management in vehicular ad hoc networks. 147-167 - Syed Rizvi, Kelsey Karpinski, Brennen Kelly, Taryn Walker:
A user oriented cloud security evaluation framework. 168-192
Volume 3, Number 3, 2016
- Md. Imran Alam, Raju Halder:
Refining dependencies for information flow analysis of database applications. 193-223 - Munaga V. N. K. Prasad, Jaipal Reddy Anugu:
Multi-algorithmic fingerprint model for cancellable template generation. 224-245 - Jeril Kuriakose, Sandeep Joshi:
Secured MPR node selection in the presence of cheating nodes. 246-268 - Christian Callegari, Stefano Giordano, Michele Pagano, Gregorio Procissi:
A secure and privacy-preserving approach to communications in smart grids. 269-290
Volume 3, Number 4, 2016
- Deepnarayan Tiwari, G. R. Gangadharan, Maode Ma:
Secure delegation of services through proxy signature with revocation. 291-318 - Mulagala Sandhya, Munaga V. N. K. Prasad:
A hybrid technique to secure fingerprint templates using Delaunay neighbour structures. 319-335 - Subhas Barman, Utpal Pal, Md. Asif Sarfaraj, Biswajit Biswas, Animesh Mahata, Palash Mandal:
A complete literature review on financial fraud detection applying data mining techniques. 336-359 - Geetha Meera, BKSP Kumar Raju Alluri, G. Geethakumari:
CEAT: a cloud evidence acquisition tool for aiding forensic investigations in cloud systems. 360-372
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.