Open Access
Subscription or Fee Access
Table of Contents
Articles
Robust Correlation of Encrypted Attack Traffic | |
S. Amuthavalli | 217-221 |
A Survey on Secured Frequent Pattern Discovery Schemes under the Cloud Environment | |
K. Banupriya, S. Kiruthika | 222-225 |
A Survey on Network Security Based on Cryptographic Techniques | |
M. Nachammai, R. Krithika, A. Madhusri | 226-228 |
Network Security and Cryptography Techniques | |
N. Valarmathy, P. Vishnupriya | 229-231 |
Data Security in System Socket Layer | |
K. Aiswarya, C. Bhuvaneswari, R. Sowmiya | 232-234 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616