Please use this identifier to cite or link to this item: http://idr.aus.ac.in/jspui/handle/21011994/696
Full metadata record
DC FieldValueLanguage
dc.contributor.authorUllah, Kefayat-
dc.contributor.authorDas, Prodipto-
dc.date.accessioned2021-06-04T08:17:39Z-
dc.date.available2021-06-04T08:17:39Z-
dc.date.issued2016-
dc.identifier.urihttp://idr.aus.ac.in/jspui/handle/21011994/696-
dc.language.isoenen_US
dc.subjectcomputer scienceen_US
dc.titleTrust Computing Models for Security Attacks in Maneten_US
dc.typeThesisen_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
01_tittle.pdf78.88 kBAdobe PDFView/Open
02_certificate.pdf83.28 kBAdobe PDFView/Open
03_preliminary.pdf178.32 kBAdobe PDFView/Open
04_abstract.pdf102.69 kBAdobe PDFView/Open
05_chapter1.pdf331.14 kBAdobe PDFView/Open
06_chapter2.pdf394.05 kBAdobe PDFView/Open
07_chapter3.pdf628.55 kBAdobe PDFView/Open
08_chapter4.pdf825.42 kBAdobe PDFView/Open
09_chapter5.pdf443.18 kBAdobe PDFView/Open
10_chapter6.pdf600.94 kBAdobe PDFView/Open
11_chapter7.pdf120.2 kBAdobe PDFView/Open
12_bibliography.pdf364.1 kBAdobe PDFView/Open
13_annexure1.pdf240.41 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.