- Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks
- Identity business processes
- A privacy enabling content distribution framework for digital rights management
- A trust-based AODV routing protocol for improved QoS in mobile ad-hoc networks
- Editorial article: On the boundaries of trust and security in computing and communications systems
15 October 2015
Free sample articles newly available from International Journal of Trust Management in Computing and Communications
The following sample articles from the International Journal of Trust Management in Computing and Communications are now available here for free:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment