International Journal of Trust Management in Computing and Communications
2014 Vol.2 No.1
Pages | Title and author(s) |
1-6 | Editorial article: On the boundaries of trust and security in computing and communications systems Al-Sakib Khan Pathan DOI: 10.1504/IJTMCC.2014.063272 |
7-21 | A trust-based AODV routing protocol for improved QoS in mobile ad-hoc networksA. Pravin Renold; S. Geethanjali DOI: 10.1504/IJTMCC.2014.063270 |
22-39 | A privacy enabling content distribution framework for digital rights managementDheerendra Mishra; Sourav Mukhopadhyay DOI: 10.1504/IJTMCC.2014.063271 |
40-77 | Identity business processesJens Müller; Klemens Böhm DOI: 10.1504/IJTMCC.2014.063274 |
78-102 | Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networksAshok Kumar Das; Santanu Chatterjee; Jamuna Kanta Sing DOI: 10.1504/IJTMCC.2014.063273 |