Table of Contents
Vol 5, No 8 (2013)
Open Access
Subscription Access
Articles
Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography | ||
Tarun Dhar Diwan, Aaqib Rshid, Vinay Sahu | ||
Vol 5, No 8 (2013), Pagination: 278-281 | ||
ABSTRACT | PDF | Abstract Views: 197 | PDF Views: 2 |
A Futuristic Digital Forensic Software Framework for Analyzing the Registry of Windows Based Systems | ||
Sangita M. Tabarno, Ashish K. Sharma, Nilmani Verma | ||
Vol 5, No 8 (2013), Pagination: 282-286 | ||
ABSTRACT | PDF | Abstract Views: 363 | PDF Views: 3 |
Secure Comprehensive File Distribution Schemes for Network Coding Driven P2P Systems | ||
Pavan Kumar Zammalamadaka, Yuva Krishna Aluri | ||
Vol 5, No 8 (2013), Pagination: 287-291 | ||
ABSTRACT | PDF | Abstract Views: 192 | PDF Views: 1 |
Delaunay Overlays for P2P Streaming Services | ||
Bala Karthikeya Kesanapalli, Divya Adusumilli | ||
Vol 5, No 8 (2013), Pagination: 292-295 | ||
ABSTRACT | PDF | Abstract Views: 199 | PDF Views: 1 |
Performance Metrics in Software Testing | ||
D. Thuthi Sarabai | ||
Vol 5, No 8 (2013), Pagination: 303-308 | ||
ABSTRACT | PDF | Abstract Views: 206 | PDF Views: 3 |