Table of Contents
Vol 5, No 8 (2013)


Articles
Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography | ||
Tarun Dhar Diwan, Aaqib Rshid, Vinay Sahu | ||
Vol 5, No 8 (2013), Pagination: 278-281 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 305 | PDF Views: 2 |
A Futuristic Digital Forensic Software Framework for Analyzing the Registry of Windows Based Systems | ||
Sangita M. Tabarno, Ashish K. Sharma, Nilmani Verma | ||
Vol 5, No 8 (2013), Pagination: 282-286 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 506 | PDF Views: 3 |
Secure Comprehensive File Distribution Schemes for Network Coding Driven P2P Systems | ||
Pavan Kumar Zammalamadaka, Yuva Krishna Aluri | ||
Vol 5, No 8 (2013), Pagination: 287-291 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 301 | PDF Views: 1 |
Delaunay Overlays for P2P Streaming Services | ||
Bala Karthikeya Kesanapalli, Divya Adusumilli | ||
Vol 5, No 8 (2013), Pagination: 292-295 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 301 | PDF Views: 1 |
Performance Metrics in Software Testing | ||
D. Thuthi Sarabai | ||
Vol 5, No 8 (2013), Pagination: 303-308 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 317 | PDF Views: 3 |