default search action
International Journal of Trust Management in Computing and Communications, Volume 1
Volume 1, Number 1, 2013
- Surya Nepal, Cécile Paris, Sanat Kumar Bista, Wanita Sherchan:
A trust model-based analysis of social networks. 3-22 - Mukesh Kumar Saini, Pradeep K. Atrey, Sharad Mehrotra, Mohan S. Kankanhalli:
Privacy aware publication of surveillance video. 23-51 - Siani Pearson, Nick Wainwright:
An interdisciplinary approach to accountability for future internet service provision. 52-72 - Leila Kheroua, Samira Moussaoui, Louiza Mansour:
EDARD: efficient data access based on rumour dissemination in wireless sensor networks. 73-84 - Punam Bedi, V. Aakanksha, Richa Sharma:
Trust and context view-based knowledge sharing in MANets. 85-103
Volume 1, Number 2, 2013
- K. Senthil Kumar, Debi Prasanna Acharjya, Arunkumar Thangavelu:
Trust evaluation using fuzzy proximity relation with ordering for MANET. 105-120 - Sabrina Nusrat, Julita Vassileva:
Simulating a trust-based service recommender system for decentralised user modelling environment. 121-139 - Soumendu Chakraborty, Anand Singh Jalal, Charul Bhatnagar:
An efficient bit plane X-OR algorithm for irreversible image steganography. 140-155 - Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A novel linear polynomial-based dynamic key management scheme for hierarchical access control. 156-174 - B. R. Purushothama, B. B. Amberker:
Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation. 175-198
Volume 1, Numbers 3/4, 2013
- Ying Gao, Lingxi Peng, Fufang Li, Miao Liu, Waixi Liu:
Archimedean copula-based estimation of distribution algorithm for multi-objective optimisation. 200-211 - Rawya Rizk, Marwa Gamal, Mahmoud Mariee:
Selective opportunistic routing based on QoS in wireless mesh network. 212-229 - Korra Sathya Babu, Rajesh Pillelli, Sanjay Kumar Jena:
Enhanced t-closeness for balancing utility and privacy. 230-242 - C. Balarengadurai, S. Saraswathi:
Fuzzy logic-based detection of DDoS attacks in IEEE 802.15.4 low rate wireless personal area network. 243-260 - Varun Dutt, Amanjot Kaur:
Cyber security: testing the effects of attack strategy, similarity, and experience on cyber attack detection. 261-273 - Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, Pawel Szalachowski:
Theory and implementation of a virtualisation level Future Internet defence in depth architecture. 274-299 - Enrico Cambiaso, Gianluca Papaleo, Giovanni Chiola, Maurizio Aiello:
Slow DoS attacks: definition and categorisation. 300-319 - Bahia Zebbane, Manel Chenait, Nadjib Badache:
GTC: a geographical topology control protocol to conserve energy in wireless sensor networks. 320-340
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.