Table of Contents
Vol 8, No 8 (2016)
Open Access
Subscription Access
Articles
Ways to Use Mobile Phones Safely | ||
Bhumika S. Zalavadia | ||
Vol 8, No 8 (2016), Pagination: 283-285 | ||
ABSTRACT | PDF | Abstract Views: 244 | PDF Views: 2 |
Reliability Analysis of Distributed Computing System using Fault Tree Analysis | ||
R. Gupta, Dr. P. K. Yadav | ||
Vol 8, No 8 (2016), Pagination: 286-291 | ||
ABSTRACT | PDF | Abstract Views: 268 | PDF Views: 2 |
A Guide to Ethical Hacking Attacks and Recent Tools | ||
B.L. Anupama, Arya Vijayakumaran Nair, Bastian Babu | ||
Vol 8, No 8 (2016), Pagination: 292-297 | ||
ABSTRACT | PDF | Abstract Views: 261 | PDF Views: 2 |
Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks | ||
Anupriya K Haridas, Sneha Johnson | ||
Vol 8, No 8 (2016), Pagination: 298-300 | ||
ABSTRACT | PDF | Abstract Views: 265 | PDF Views: 3 |
Discovering and Depurating Scheme for Wormhole Attack in Wireless Mesh Network | ||
Sruthy O. Damodaran, Sindhu S Nair | ||
Vol 8, No 8 (2016), Pagination: 301-304 | ||
ABSTRACT | PDF | Abstract Views: 249 | PDF Views: 2 |
An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics | ||
K.H. Aparna, M.B. Shyjith | ||
Vol 8, No 8 (2016), Pagination: 305-308 | ||
ABSTRACT | PDF | Abstract Views: 294 | PDF Views: 2 |