
International Journal of Trust Management in Computing and Communications
2014 Vol.2 No.3
Pages | Title and author(s) |
207-228 | Analysis and modelling of semantic attacks in online social networksK.P. Krishna Kumar; G. Geethakumari DOI: 10.1504/IJTMCC.2014.067306 |
229-258 | Development of a reliable trust management model in social internet of thingsMrutyunjaya Panda; Ajith Abraham DOI: 10.1504/IJTMCC.2014.067305 |
259-295 | A survey on user access control in wireless sensor networks with formal security verificationSantanu Chatterjee; Ashok Kumar Das; Jamuna Kanta Sing DOI: 10.1504/IJTMCC.2014.067303 |
296-308 | Hand vein authentication system using connected minutiae neighboursMunaga V.N.K. Prasad; Ilaiah Kavati DOI: 10.1504/IJTMCC.2014.067304 |