
International Journal of Trust Management in Computing and Communications
2015 Vol.3 No.1
| Pages | Title and author(s) |
| 1-18 | Mitigating malicious feedback attacks in trust management systemsSoon Keow Chong; Jemal H. Abawajy DOI: 10.1504/IJTMCC.2015.072455 |
| 19-39 | Privacy landscape in online social networksAgrima Srivastava; G. Geethakumari DOI: 10.1504/IJTMCC.2015.072461 |
| 40-73 | TFSR: trust factors evaluation-based secure routing protocol for wireless sensor networkV. Geetha; K. Chandrasekaran DOI: 10.1504/IJTMCC.2015.072465 |
| 74-92 | An audio encryption technique through compressive sensing and Arnold transformNishanth Augustine; Sudhish N. George; Deepthi P. Pattathil DOI: 10.1504/IJTMCC.2015.072467 |