

Table of Contents
Articles
Robust Correlation of Encrypted Attack Traffic |
PDF
![]() |
S. Amuthavalli | 217-221 |
A Survey on Secured Frequent Pattern Discovery Schemes under the Cloud Environment |
PDF
![]() |
K. Banupriya, S. Kiruthika | 222-225 |
A Survey on Network Security Based on Cryptographic Techniques |
PDF
![]() |
M. Nachammai, R. Krithika, A. Madhusri | 226-228 |
Network Security and Cryptography Techniques |
PDF
![]() |
N. Valarmathy, P. Vishnupriya | 229-231 |
Data Security in System Socket Layer |
PDF
![]() |
K. Aiswarya, C. Bhuvaneswari, R. Sowmiya | 232-234 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616