Vol 5, No 8 (2013)

Table of Contents

Vol 5, No 8 (2013)

Open Access Open Access  Restricted Access Subscription Access

Articles

Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography
Tarun Dhar Diwan, Aaqib Rshid, Vinay Sahu
 Vol 5, No 8 (2013), Pagination: 278-281
ABSTRACT |  PDF     Abstract Views: 197  |  PDF Views: 2
A Futuristic Digital Forensic Software Framework for Analyzing the Registry of Windows Based Systems
Sangita M. Tabarno, Ashish K. Sharma, Nilmani Verma
 Vol 5, No 8 (2013), Pagination: 282-286
ABSTRACT |  PDF     Abstract Views: 363  |  PDF Views: 3
Secure Comprehensive File Distribution Schemes for Network Coding Driven P2P Systems
Pavan Kumar Zammalamadaka, Yuva Krishna Aluri
 Vol 5, No 8 (2013), Pagination: 287-291
ABSTRACT |  PDF     Abstract Views: 192  |  PDF Views: 1
Delaunay Overlays for P2P Streaming Services
Bala Karthikeya Kesanapalli, Divya Adusumilli
 Vol 5, No 8 (2013), Pagination: 292-295
ABSTRACT |  PDF     Abstract Views: 199  |  PDF Views: 1
Performance Metrics in Software Testing
D. Thuthi Sarabai
 Vol 5, No 8 (2013), Pagination: 303-308
ABSTRACT |  PDF     Abstract Views: 206  |  PDF Views: 3