The following sample articles from the
International Journal of Trust Management in Computing and Communications are now
available here for free:
- Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks
- Identity business processes
- A privacy enabling content distribution framework for digital rights management
- A trust-based AODV routing protocol for improved QoS in mobile ad-hoc networks
- Editorial article: On the boundaries of trust and security in computing and communications systems
No comments:
Post a Comment
Note: only a member of this blog may post a comment.