![Open Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography |
PDF
![]() |
Tarun Dhar Diwan, Aaqib Rshid, Vinay Sahu | 278-281 |
A Futuristic Digital Forensic Software Framework for Analyzing the Registry of Windows Based Systems |
PDF
![]() |
Sangita M. Tabarno, Ashish K. Sharma, Nilmani Verma | 282-286 |
Secure Comprehensive File Distribution Schemes for Network Coding Driven P2P Systems |
PDF
![]() |
Pavan Kumar Zammalamadaka, Yuva Krishna Aluri | 287-291 |
Delaunay Overlays for P2P Streaming Services |
PDF
![]() |
Bala Karthikeya Kesanapalli, Divya Adusumilli | 292-295 |
Performance Metrics in Software Testing |
PDF
![]() |
D. Thuthi Sarabai | 303-308 |
![Creative Commons License](http://i.creativecommons.org/l/by/3.0/80x15.png)
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9632