![Open Access](https://www.ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://www.ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
Fingerprint Based Attendance System Using Wireless Communication |
PDF
![]() |
M.P. Gajare, Vinit Malpeddi, Shubham Kusre, Payal Battuwar, Ganesh Khillari | 79-82 |
Comparative Analysis of Pipelined SHA-1 Algorithm based on Different Methodologies |
PDF
![]() |
Ritu Kaur Makkad, Anil Kumar Sahu | 83-88 |
An Implementation for Securing Data on Cloud through Encryption |
PDF
![]() |
Ashima Singh Rajput | 89-91 |
Keyword Based Testing of Windows Application |
PDF
![]() |
Sharma Tarun, Suruchi Kaur, Ashirwad Kasalkar Dhanjal, J N Swathi | 92-96 |
Emergency Alert System Using Location Based Identification for Android Text Message Services |
PDF
![]() |
V. Lavanya, D. Jayakumar, S. Sivachandrian | 97-99 |
![Creative Commons License](http://i.creativecommons.org/l/by/3.0/80x15.png)
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 956X