
International Journal of Trust Management in Computing and Communications
2015 Vol.3 No.2
| Pages | Title and author(s) |
| 93-114 | HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attackNilesh Chakraborty; Samrat Mondal DOI: 10.1504/IJTMCC.2015.076952 |
| 115-146 | Role of parameter adaptation in chaotic communicationArti Dwivedi; Ashok Kumar Mittal; Suneet Dwivedi DOI: 10.1504/IJTMCC.2015.076953 |
| 147-167 | A theoretical framework for trust management in vehicular ad hoc networks Jared Oluoch DOI: 10.1504/IJTMCC.2015.076961 |
| 168-192 | A user oriented cloud security evaluation frameworkSyed Rizvi; Kelsey Karpinski; Brennen Kelly; Taryn Walker DOI: 10.1504/IJTMCC.2015.076966 |