- Hisham Salah, Mohamed Eltoweissy. Personalised reconfigurable trust management. IJTMCC, 4(2):132-171, 2018.
- Anant V. Nimkar, Soumya K. Ghosh. Caucus: an authentication protocol for cloud federation. IJTMCC, 4(2):111-131, 2018.
- Rangareddy Jayashree, A. Christy, S. Venkatesh. Personalised recommendation system for ranking in question-answering websites with splay tree by avoiding tumbleweed badge. IJTMCC, 4(2):172-191, 2018.
- Kenneth David Strang. Socio-cultural distrust of internet information. IJTMCC, 4(2):95-110, 2018.
- Vimal Kumar 0002, Rakesh Kumar, Jitendra Singh. An efficient and secure RSA-based certificateless signature scheme for wireless sensor networks. IJTMCC, 4(1):17-35, 2017.
- Albert Rego, Christos Gkountis, Laura GarcĂa, Jaime Lloret. A new proposal for trust management in wireless sensor networks based on validation. IJTMCC, 4(1):1-16, 2017.
- Kamel Saddiki, Sofiane BOUKLI HACENE, Pascal Lorenz, Marc Gilg. Black hole attack detection and ignoring in OLSR protocol. IJTMCC, 4(1):75-93, 2017.
- Eric D. Kameni, Theo P. van der Weide. Intrusion detection in a trust-based recommendation system. IJTMCC, 4(1):52-74, 2017.
- Kapil Sharma, Brijesh Kumar Chaurasia, Shekhar Verma, Arpita Bhargava. Trust computation in VANET using TOEFV. IJTMCC, 4(1):36-51, 2017.
- Deepnarayan Tiwari, G. R. Gangadharan, Maode Ma. Secure delegation of services through proxy signature with revocation. IJTMCC, 3(4):291-318, 2016.