Vol. 1, No. 1, 2013
- A Privacy Preserving Scheme in Wireless Sensor Networks
Volume 1, No. 1, 2013, 16 pages
DOI: http://dx.doi.org/10.21742/ijsbt.2013.1.1.01
Authors: Xiao Shijie, Shekhar Verma, Ashmita Debnath, and Geetam S. Tomar
- Multiple Energy detectors Based Cognitive Radio Networks Using Adaptive Double-Threshold scheme
Volume 1, No. 1, 2013, 12 pages
DOI: http://dx.doi.org/10.21742/ijsbt.2013.1.1.02
Authors: Jun Hee Lee, Ashish Bagwari, and Geetam Singh Tomar
- Application of Reputation Trust Model in C2C E-commerce
Volume 1, No. 1, 2013, 10 pages
DOI: http://dx.doi.org/10.21742/ijsbt.2013.1.1.03
Authors: Alejandra Lazcano
- User Preference Collaborative Filtering Recommendation Algorithm based on Data Mining
Volume 1, No. 1, 2013, 10 pages
DOI: http://dx.doi.org/10.21742/ijsbt.2013.1.1.04
Authors: Andrew M. Barthelemy and George Suter
- Research on Trust Model of E-commerce in P2P Environment
Volume 1, No. 1, 2013, 10 pages
DOI: http://dx.doi.org/10.21742/ijsbt.2013.1.1.05
Authors: Jianbang Du