

Table of Contents
Articles
Ways to Use Mobile Phones Safely |
PDF
![]() |
Bhumika S. Zalavadia | 283-285 |
Reliability Analysis of Distributed Computing System using Fault Tree Analysis |
PDF
![]() |
R. Gupta, Dr. P. K. Yadav | 286-291 |
A Guide to Ethical Hacking Attacks and Recent Tools |
PDF
![]() |
B.L. Anupama, Arya Vijayakumaran Nair, Bastian Babu | 292-297 |
Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks |
PDF
![]() |
Anupriya K Haridas, Sneha Johnson | 298-300 |
Discovering and Depurating Scheme for Wormhole Attack in Wireless Mesh Network |
PDF
![]() |
Sruthy O. Damodaran, Sindhu S Nair | 301-304 |
An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics |
PDF
![]() |
K.H. Aparna, M.B. Shyjith | 305-308 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616