Sample issue


You can read all of these full-text articles free of charge - click Free access


International Journal of Trust Management in Computing and Communications (IJTMCC)

Title Author(s) Vol. and Issue nos. Page nos. Full-text article
Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networksAshok Kumar Das; Santanu Chatterjee; Jamuna Kanta SingVol.2 No.178-102Free access
Identity business processesJens Müller; Klemens BöhmVol.2 No.140-77Free access
A privacy enabling content distribution framework for digital rights managementDheerendra Mishra; Sourav MukhopadhyayVol.2 No.122-39Free access
A trust-based AODV routing protocol for improved QoS in mobile ad-hoc networksA. Pravin Renold; S. GeethanjaliVol.2 No.17-21Free access
Editorial article: On the boundaries of trust and security in computing and communications systems Al-Sakib Khan PathanVol.2 No.11-6Free access