International Journal of Trust Management in Computing and Communications
2014 Vol.2 No.2
Pages | Title and author(s) |
103-124 | Trust integrated node potential aware routing for WSNsShaik Sahil Babu; Arnab Raha; Omar Alfandi; Dieter Hogrefe; Mrinal Kanti Naskar DOI: 10.1504/IJTMCC.2014.064142 |
125-149 | Agent-based approach for identity and access management in the inter-cloud environmentsManoj V. Thomas; K. Chandra Sekaran DOI: 10.1504/IJTMCC.2014.064144 |
150-184 | A deterministic key pre-distribution scheme for WSN using projective planes and their complementsSarbari Mitra; Ratna Dutta; Sourav Mukhopadhyay DOI: 10.1504/IJTMCC.2014.064157 |
185-205 | Security automaton to mitigate laser-based fault attacks on smart cardsGuillaume Bouffard; Bhagyalekshmy N. Thampi; Jean-Louis Lanet DOI: 10.1504/IJTMCC.2014.064158 |