International Journal of Trust Management in Computing and Communications
2014 Vol.2 No.4
Pages | Title and author(s) |
309-329 | I-SLASS: an improved login approach over SLASSNilesh Chakraborty; Samrat Mondal DOI: 10.1504/IJTMCC.2014.067375 |
330-352 | An access control model for cloud-based EMR federationAnant V. Nimkar; Soumya K. Ghosh DOI: 10.1504/IJTMCC.2014.067369 |
353-378 | Computationally perfect compartmented secret sharing schemes based on MDS codesAppala Naidu Tentu; Prabal Paul; V.Ch. Venkaiah DOI: 10.1504/IJTMCC.2014.067378 |
379-405 | Improved recovery probability of mobile hosts using energy and mobility-based secure checkpointing-recoverySuparna Biswas; Priyanka Dey; Sarmistha Neogy DOI: 10.1504/IJTMCC.2014.067360 |