International Journal of Trust Management in Computing and Communications
2013 Vol.1 No.2
Pages | Title and author(s) |
105-120 | Trust evaluation using fuzzy proximity relation with ordering for MANETK. Senthil Kumar; D.P. Acharjya; Arunkumar Thangavelu DOI: 10.1504/IJTMCC.2013.053259 |
121-139 | Simulating a trust-based service recommender system for decentralised user modelling environmentSabrina Nusrat; Julita Vassileva DOI: 10.1504/IJTMCC.2013.053262 |
140-155 | An efficient bit plane X-OR algorithm for irreversible image steganographySoumendu Chakraborty; Anand Singh Jalal; Charul Bhatnagar DOI: 10.1504/IJTMCC.2013.053263 |
156-174 | A novel linear polynomial-based dynamic key management scheme for hierarchical access controlVanga Odelu; Ashok Kumar Das; Adrijit Goswami DOI: 10.1504/IJTMCC.2013.053278 |
175-198 | Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computationB.R. Purushothama; B.B. Amberker DOI: 10.1504/IJTMCC.2013.053279 |