Open Access
Subscription or Fee Access
Table of Contents
Articles
Ways to Use Mobile Phones Safely | |
Bhumika S. Zalavadia | 283-285 |
Reliability Analysis of Distributed Computing System using Fault Tree Analysis | |
R. Gupta, Dr. P. K. Yadav | 286-291 |
A Guide to Ethical Hacking Attacks and Recent Tools | |
B.L. Anupama, Arya Vijayakumaran Nair, Bastian Babu | 292-297 |
Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks | |
Anupriya K Haridas, Sneha Johnson | 298-300 |
Discovering and Depurating Scheme for Wormhole Attack in Wireless Mesh Network | |
Sruthy O. Damodaran, Sindhu S Nair | 301-304 |
An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics | |
K.H. Aparna, M.B. Shyjith | 305-308 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616