International Journal of Trust Management in Computing and Communications
2016 Vol.3 No.4
Pages | Title and author(s) |
291-318 | Secure delegation of services through proxy signature with revocationDeepnarayan Tiwari; G.R. Gangadharan; Maode Ma DOI: 10.1504/IJTMCC.2016.084559 |
319-335 | A hybrid technique to secure fingerprint templates using Delaunay neighbour structuresMulagala Sandhya; Munaga V.N.K. Prasad DOI: 10.1504/IJTMCC.2016.084560 |
336-359 | A complete literature review on financial fraud detection applying data mining techniquesSubhas Barman; Utpal Pal; Md. Asif Sarfaraj; Biswajit Biswas; Animesh Mahata; Palash Mandal DOI: 10.1504/IJTMCC.2016.084561 |
360-372 | CEAT: a cloud evidence acquisition tool for aiding forensic investigations in cloud systemsGeetha Meera; BKSP Kumar Raju Alluri; G. Geethakumari DOI: 10.1504/IJTMCC.2016.084562 |