Sample articles
You can read all of these full-text articles free of charge - click
International Journal of Trust Management in Computing and Communications
Title | Author(s) | Vol. and Issue nos. | Page nos. | Full-text article |
An audio encryption technique through compressive sensing and Arnold transform | Nishanth Augustine; Sudhish N. George; Deepthi P. Pattathil | Vol.3 No.1 | 74-92 | |
TFSR: trust factors evaluation-based secure routing protocol for wireless sensor network | V. Geetha; K. Chandrasekaran | Vol.3 No.1 | 40-73 | |
Privacy landscape in online social networks | Agrima Srivastava; G. Geethakumari | Vol.3 No.1 | 19-39 | |
Mitigating malicious feedback attacks in trust management systems | Soon Keow Chong; Jemal H. Abawajy | Vol.3 No.1 | 1-18 |