Please use this identifier to cite or link to this item:
http://localhost:80/xmlui/handle/123456789/871
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.date.accessioned | 2017-02-23T04:57:55Z | - |
dc.date.available | 2017-02-23T04:57:55Z | - |
dc.date.issued | 2015 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/871 | - |
dc.language.iso | en | en_US |
dc.subject | Question paper | en_US |
dc.subject | 2nd Sem | en_US |
dc.subject | 2015 | en_US |
dc.subject | CSEN 5234 | en_US |
dc.subject | Even Sem | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Cryptography and Network Security | en_US |
dc.subject | M.Tech | en_US |
dc.title | M.TECH_CSE_2nd Sem_Cryptography and Network Security | en_US |
dc.type | Other | en_US |
Appears in Collections: | 2015_M.Tech_CSE_1st Sem to 3rd Sem |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
formated CSEN5234 SET I.pdf | 330.94 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.