Table of Contents
Vol 5, No 8 (2013)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography | ||
Tarun Dhar Diwan, Aaqib Rshid, Vinay Sahu | ||
Vol 5, No 8 (2013), Pagination: 278-281 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 156 | PDF Views: 2 |
A Futuristic Digital Forensic Software Framework for Analyzing the Registry of Windows Based Systems | ||
Sangita M. Tabarno, Ashish K. Sharma, Nilmani Verma | ||
Vol 5, No 8 (2013), Pagination: 282-286 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 302 | PDF Views: 3 |
Secure Comprehensive File Distribution Schemes for Network Coding Driven P2P Systems | ||
Pavan Kumar Zammalamadaka, Yuva Krishna Aluri | ||
Vol 5, No 8 (2013), Pagination: 287-291 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 147 | PDF Views: 1 |
Delaunay Overlays for P2P Streaming Services | ||
Bala Karthikeya Kesanapalli, Divya Adusumilli | ||
Vol 5, No 8 (2013), Pagination: 292-295 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 155 | PDF Views: 1 |
Performance Metrics in Software Testing | ||
D. Thuthi Sarabai | ||
Vol 5, No 8 (2013), Pagination: 303-308 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 161 | PDF Views: 3 |