Volume 8; Issue 2

IET Information Security

Volume 8; Issue 2
1

Identity management and trusted interaction in Internet and mobile computing

Year:
2014
Language:
english
File:
PDF, 742 KB
english, 2014
2

Research of trust model based on fuzzy theory in mobile ad hoc networks

Year:
2014
Language:
english
File:
PDF, 483 KB
english, 2014
3

Identity-based remote data possession checking in public clouds

Year:
2014
Language:
english
File:
PDF, 269 KB
english, 2014
8

Establishing user trust in automated teller machine integrity

Year:
2014
Language:
english
File:
PDF, 268 KB
english, 2014