Vol 9, No 9 (2017)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents

Articles

Robust Correlation of Encrypted Attack Traffic PDF
S. Amuthavalli 217-221
A Survey on Secured Frequent Pattern Discovery Schemes under the Cloud Environment PDF
K. Banupriya, S. Kiruthika 222-225
A Survey on Network Security Based on Cryptographic Techniques PDF
M. Nachammai, R. Krithika, A. Madhusri 226-228
Network Security and Cryptography Techniques PDF
N. Valarmathy, P. Vishnupriya 229-231
Data Security in System Socket Layer PDF
K. Aiswarya, C. Bhuvaneswari, R.  Sowmiya 232-234


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616