International Journal of Trust Management in Computing and Communications
2016 Vol.3 No.3
Pages | Title and author(s) |
193-223 | Refining dependencies for information flow analysis of database applicationsMd. Imran Alam; Raju Halder DOI: 10.1504/IJTMCC.2016.081846 |
224-245 | Multi-algorithmic fingerprint model for cancellable template generationMunaga V.N.K. Prasad; Jaipal Reddy Anugu DOI: 10.1504/IJTMCC.2016.081847 |
246-268 | Secured MPR node selection in the presence of cheating nodesJeril Kuriakose; Sandeep Joshi DOI: 10.1504/IJTMCC.2016.081849 |
269-290 | A secure and privacy-preserving approach to communications in smart gridsChristian Callegari; Stefano Giordano; Michele Pagano; Gregorio Procissi DOI: 10.1504/IJTMCC.2016.081853 |