Search dblp for Publications

export results for "toc:db/journals/ijtmcc/ijtmcc1.bht:"

 download as .bib file

@article{DBLP:journals/ijtmcc/BabuPJ13,
  author       = {Korra Sathya Babu and
                  Rajesh Pillelli and
                  Sanjay Kumar Jena},
  title        = {Enhanced t-closeness for balancing utility and privacy},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {3/4},
  pages        = {230--242},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.056427},
  doi          = {10.1504/IJTMCC.2013.056427},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/BabuPJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/BalarengaduraiS13,
  author       = {C. Balarengadurai and
                  S. Saraswathi},
  title        = {Fuzzy logic-based detection of DDoS attacks in {IEEE} 802.15.4 low
                  rate wireless personal area network},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {3/4},
  pages        = {243--260},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.056424},
  doi          = {10.1504/IJTMCC.2013.056424},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/BalarengaduraiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/BediAS13,
  author       = {Punam Bedi and
                  V. Aakanksha and
                  Richa Sharma},
  title        = {Trust and context view-based knowledge sharing in MANets},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {1},
  pages        = {85--103},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.052527},
  doi          = {10.1504/IJTMCC.2013.052527},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/BediAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/CambiasoPCA13,
  author       = {Enrico Cambiaso and
                  Gianluca Papaleo and
                  Giovanni Chiola and
                  Maurizio Aiello},
  title        = {Slow DoS attacks: definition and categorisation},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {3/4},
  pages        = {300--319},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.056440},
  doi          = {10.1504/IJTMCC.2013.056440},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/CambiasoPCA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/ChakrabortyJB13,
  author       = {Soumendu Chakraborty and
                  Anand Singh Jalal and
                  Charul Bhatnagar},
  title        = {An efficient bit plane {X-OR} algorithm for irreversible image steganography},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {2},
  pages        = {140--155},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.053263},
  doi          = {10.1504/IJTMCC.2013.053263},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/ChakrabortyJB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/DuttK13,
  author       = {Varun Dutt and
                  Amanjot Kaur},
  title        = {Cyber security: testing the effects of attack strategy, similarity,
                  and experience on cyber attack detection},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {3/4},
  pages        = {261--273},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.056428},
  doi          = {10.1504/IJTMCC.2013.056428},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/DuttK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/GaoPLLL13,
  author       = {Ying Gao and
                  Lingxi Peng and
                  Fufang Li and
                  Miao Liu and
                  Waixi Liu},
  title        = {Archimedean copula-based estimation of distribution algorithm for
                  multi-objective optimisation},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {3/4},
  pages        = {200--211},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.056430},
  doi          = {10.1504/IJTMCC.2013.056430},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/GaoPLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/KherouaMM13,
  author       = {Leila Kheroua and
                  Samira Moussaoui and
                  Louiza Mansour},
  title        = {{EDARD:} efficient data access based on rumour dissemination in wireless
                  sensor networks},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {1},
  pages        = {73--84},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.052526},
  doi          = {10.1504/IJTMCC.2013.052526},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/KherouaMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/KonorskiPKKCS13,
  author       = {Jerzy Konorski and
                  Piotr Pacyna and
                  Grzegorz Kolaczek and
                  Zbigniew Kotulski and
                  Krzysztof Cabaj and
                  Pawel Szalachowski},
  title        = {Theory and implementation of a virtualisation level Future Internet
                  defence in depth architecture},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {3/4},
  pages        = {274--299},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.056431},
  doi          = {10.1504/IJTMCC.2013.056431},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/KonorskiPKKCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/KumarAT13,
  author       = {K. Senthil Kumar and
                  Debi Prasanna Acharjya and
                  Arunkumar Thangavelu},
  title        = {Trust evaluation using fuzzy proximity relation with ordering for
                  {MANET}},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {2},
  pages        = {105--120},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.053259},
  doi          = {10.1504/IJTMCC.2013.053259},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/KumarAT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/NepalPBS13,
  author       = {Surya Nepal and
                  C{\'{e}}cile Paris and
                  Sanat Kumar Bista and
                  Wanita Sherchan},
  title        = {A trust model-based analysis of social networks},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {1},
  pages        = {3--22},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.052522},
  doi          = {10.1504/IJTMCC.2013.052522},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/NepalPBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/NusratV13,
  author       = {Sabrina Nusrat and
                  Julita Vassileva},
  title        = {Simulating a trust-based service recommender system for decentralised
                  user modelling environment},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {2},
  pages        = {121--139},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.053262},
  doi          = {10.1504/IJTMCC.2013.053262},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/NusratV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/OdeluDG13,
  author       = {Vanga Odelu and
                  Ashok Kumar Das and
                  Adrijit Goswami},
  title        = {A novel linear polynomial-based dynamic key management scheme for
                  hierarchical access control},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {2},
  pages        = {156--174},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.053278},
  doi          = {10.1504/IJTMCC.2013.053278},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/OdeluDG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/PearsonW13,
  author       = {Siani Pearson and
                  Nick Wainwright},
  title        = {An interdisciplinary approach to accountability for future internet
                  service provision},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {1},
  pages        = {52--72},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.052524},
  doi          = {10.1504/IJTMCC.2013.052524},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/PearsonW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/PurushothamaA13,
  author       = {B. R. Purushothama and
                  B. B. Amberker},
  title        = {Secure group key management scheme for simultaneous multiple groups
                  with overlapped memberships using binomial key tree with new approach
                  to key distribution and key computation},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {2},
  pages        = {175--198},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.053279},
  doi          = {10.1504/IJTMCC.2013.053279},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/PurushothamaA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/RizkGM13,
  author       = {Rawya Rizk and
                  Marwa Gamal and
                  Mahmoud Mariee},
  title        = {Selective opportunistic routing based on QoS in wireless mesh network},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {3/4},
  pages        = {212--229},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.056425},
  doi          = {10.1504/IJTMCC.2013.056425},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/RizkGM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/SainiAMK13,
  author       = {Mukesh Kumar Saini and
                  Pradeep K. Atrey and
                  Sharad Mehrotra and
                  Mohan S. Kankanhalli},
  title        = {Privacy aware publication of surveillance video},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {1},
  pages        = {23--51},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.052523},
  doi          = {10.1504/IJTMCC.2013.052523},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/SainiAMK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/ZebbaneCB13,
  author       = {Bahia Zebbane and
                  Manel Chenait and
                  Nadjib Badache},
  title        = {{GTC:} a geographical topology control protocol to conserve energy
                  in wireless sensor networks},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {1},
  number       = {3/4},
  pages        = {320--340},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJTMCC.2013.056446},
  doi          = {10.1504/IJTMCC.2013.056446},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/ZebbaneCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics