
International Journal of Trust Management in Computing and Communications
2015 Vol.3 No.1
Pages | Title and author(s) |
1-18 | Mitigating malicious feedback attacks in trust management systemsSoon Keow Chong; Jemal H. Abawajy DOI: 10.1504/IJTMCC.2015.072455 |
19-39 | Privacy landscape in online social networksAgrima Srivastava; G. Geethakumari DOI: 10.1504/IJTMCC.2015.072461 |
40-73 | TFSR: trust factors evaluation-based secure routing protocol for wireless sensor networkV. Geetha; K. Chandrasekaran DOI: 10.1504/IJTMCC.2015.072465 |
74-92 | An audio encryption technique through compressive sensing and Arnold transformNishanth Augustine; Sudhish N. George; Deepthi P. Pattathil DOI: 10.1504/IJTMCC.2015.072467 |