International Journal of Security, Privacy and Trust Management ( IJSPTM )
ISSN 2277 - 5498 [Online]; 2319 - 4103 [Print]
With the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks–both wired and wireless–centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
Authors are invited to Submit papers for this journal through Email: ijsptm@aircconline.com or through Submission system Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Submission Deadline | : | June 08, 2025 |
Authors Notification | : | July 08, 2025 |
Final Manuscript Due | : | July 15, 2025 |
Publication Date | : | Determined by the Editor-in-Chief |
November 2024, Volume 13, Number 4
Generative AI Ethics: a Comprehensive Safety and Regulation Framework Full Text
Arun kumar Thirunagalingam, Data & Technical Operations, USA
August 2024, Volume 13, Number 3
Optimizing Identity Management: Key Strategies for Effective Governance and Administration Full Text
Nikhil Ghadge, Okta.Inc, USA
Guardians of the Digital Realm: Mapping Key Stakeholders in Data Privacy and Digital Credit Universe Full Text
Oluwabunmi A. Falebita1 and Oluwafemi P. Famakinde2, 1Innovation and Technology Policy Department, Nigeria 2Nigeria Institute of Social and Economic Research (NISER), Nigeria
May 2024, Volume 13, Number 1/2
Analysis of Media Discourse on Intellectual Property Rights Related to Metaverse in Korea Full Text November 2023, Volume 12, Number 3/4 Deep Learning Meets Blockchain for Automated and Secure Access Control Full Text Object Capability Model for Tee: A Cheri Based Compartmentalization Approach Full Text May 2023, Volume 12, Number 2 The Performance Comparison of a Brute-Force Password Cracking Algorithm using Regular Functions and Generator Functions in Python Full Text February 2023, Volume 12, Number 1 How Reversibility Differentiates Cyber from Kinetic Warfare: A Case Study in the Energy Sector Full Text A Trust Management Framework for Vehicular Ad Hoc Networks Full Text August 2022, Volume 11, Number 3 Technical Analysis on the Cyber Organizational Criminology of Dictatorial Military Conducts -- Experience from Human Trafficking and Coercions by Military Cyber Aggressions Enhanced Fuzzing System for Proactive Security Gap Exposure
Ye-Sol Seo1, Hyo-Min Kim1, Austin Kang2, 1Hankuk University of Foreign Studies, Republic of Korea, 2Seoul National University, Republic of Korea
Asma Jodeiri Akbarfam1, Sina Barazandeh2, Deepti Gupta3, and Hoda Maleki1, 1Augusta University, Augusta, USA,
2Bilkent University, Turkey, 3Texas A&M University Central Texas, USA
Bala Subramanyan, Verifoxx Ltd, UK
Berker Tasoluk1, Zuhal Tanrikulu2,1Istanbul University, Turkey, 2Bogazici University, Turkey
Tom Johansmeyer, University of Kent, UK
Rezvi Shahariar and Chris Phillips, University of London, UK
Yang Pachankis, Universal Life Church, USA
Linlin Zhang and Ning Luo, Visual Computing Group, Intel Asia-Pacific Research & Development Ltd, China
GasMASk Annotation-based Code Generator as an Embedded Domain-Specific Language in Collaborative Multi-Agent Systems
Orcun Oruc and Uwe Aßmann, TU Dresden, Germany
February 2021, Volume 10, Number 1
Security and Privacy Perceptions among Female Online Social Media Users: A Case Study of Bangladesh
Farida Chowdhury, Sadia Sultana and Mahruba Sharmin Chowdhury, Shahjalal University of Science and Technology, Bangladesh
User Name : john
Posted 16-04-2025 on 16:40:30 AEDT