International Journal of Trust Management in Computing and Communications
2015 Vol.3 No.2
Pages | Title and author(s) |
93-114 | HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attackNilesh Chakraborty; Samrat Mondal DOI: 10.1504/IJTMCC.2015.076952 |
115-146 | Role of parameter adaptation in chaotic communicationArti Dwivedi; Ashok Kumar Mittal; Suneet Dwivedi DOI: 10.1504/IJTMCC.2015.076953 |
147-167 | A theoretical framework for trust management in vehicular ad hoc networks Jared Oluoch DOI: 10.1504/IJTMCC.2015.076961 |
168-192 | A user oriented cloud security evaluation frameworkSyed Rizvi; Kelsey Karpinski; Brennen Kelly; Taryn Walker DOI: 10.1504/IJTMCC.2015.076966 |