Please use this identifier to cite or link to this item:
http://idr.aus.ac.in/jspui/handle/21011994/696
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ullah, Kefayat | - |
dc.contributor.author | Das, Prodipto | - |
dc.date.accessioned | 2021-06-04T08:17:39Z | - |
dc.date.available | 2021-06-04T08:17:39Z | - |
dc.date.issued | 2016 | - |
dc.identifier.uri | http://idr.aus.ac.in/jspui/handle/21011994/696 | - |
dc.language.iso | en | en_US |
dc.subject | computer science | en_US |
dc.title | Trust Computing Models for Security Attacks in Manet | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_tittle.pdf | 78.88 kB | Adobe PDF | View/Open | |
02_certificate.pdf | 83.28 kB | Adobe PDF | View/Open | |
03_preliminary.pdf | 178.32 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 102.69 kB | Adobe PDF | View/Open | |
05_chapter1.pdf | 331.14 kB | Adobe PDF | View/Open | |
06_chapter2.pdf | 394.05 kB | Adobe PDF | View/Open | |
07_chapter3.pdf | 628.55 kB | Adobe PDF | View/Open | |
08_chapter4.pdf | 825.42 kB | Adobe PDF | View/Open | |
09_chapter5.pdf | 443.18 kB | Adobe PDF | View/Open | |
10_chapter6.pdf | 600.94 kB | Adobe PDF | View/Open | |
11_chapter7.pdf | 120.2 kB | Adobe PDF | View/Open | |
12_bibliography.pdf | 364.1 kB | Adobe PDF | View/Open | |
13_annexure1.pdf | 240.41 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.