Vol 8, No 8 (2016)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents


Ways to Use Mobile Phones Safely PDF
Bhumika S. Zalavadia 283-285
Reliability Analysis of Distributed Computing System using Fault Tree Analysis PDF
R. Gupta, Dr. P. K. Yadav 286-291
A Guide to Ethical Hacking Attacks and Recent Tools PDF
B.L. Anupama, Arya Vijayakumaran Nair, Bastian Babu 292-297
Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks PDF
Anupriya K Haridas, Sneha Johnson 298-300
Discovering and Depurating Scheme for Wormhole Attack in Wireless Mesh Network PDF
Sruthy O. Damodaran, Sindhu  S Nair 301-304
An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics PDF
K.H. Aparna, M.B. Shyjith 305-308

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616