Vol 5, No 8 (2013)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents


Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography PDF
Tarun Dhar Diwan, Aaqib Rshid, Vinay Sahu 278-281
A Futuristic Digital Forensic Software Framework for Analyzing the Registry of Windows Based Systems PDF
Sangita M. Tabarno, Ashish K. Sharma, Nilmani Verma 282-286
Secure Comprehensive File Distribution Schemes for Network Coding Driven P2P Systems PDF
Pavan Kumar Zammalamadaka, Yuva Krishna Aluri 287-291
Delaunay Overlays for P2P Streaming Services PDF
Bala Karthikeya Kesanapalli, Divya Adusumilli 292-295
Performance Metrics in Software Testing PDF
D. Thuthi Sarabai 303-308

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9632