Table of Contents
Articles
| Ways to Use Mobile Phones Safely |
PDF
|
| Bhumika S. Zalavadia | 283-285 |
| Reliability Analysis of Distributed Computing System using Fault Tree Analysis |
PDF
|
| R. Gupta, Dr. P. K. Yadav | 286-291 |
| A Guide to Ethical Hacking Attacks and Recent Tools |
PDF
|
| B.L. Anupama, Arya Vijayakumaran Nair, Bastian Babu | 292-297 |
| Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks |
PDF
|
| Anupriya K Haridas, Sneha Johnson | 298-300 |
| Discovering and Depurating Scheme for Wormhole Attack in Wireless Mesh Network |
PDF
|
| Sruthy O. Damodaran, Sindhu S Nair | 301-304 |
| An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics |
PDF
|
| K.H. Aparna, M.B. Shyjith | 305-308 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616