Table of Contents
Articles
| Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography |
PDF
|
| Tarun Dhar Diwan, Aaqib Rshid, Vinay Sahu | 278-281 |
| A Futuristic Digital Forensic Software Framework for Analyzing the Registry of Windows Based Systems |
PDF
|
| Sangita M. Tabarno, Ashish K. Sharma, Nilmani Verma | 282-286 |
| Secure Comprehensive File Distribution Schemes for Network Coding Driven P2P Systems |
PDF
|
| Pavan Kumar Zammalamadaka, Yuva Krishna Aluri | 287-291 |
| Delaunay Overlays for P2P Streaming Services |
PDF
|
| Bala Karthikeya Kesanapalli, Divya Adusumilli | 292-295 |
| Performance Metrics in Software Testing |
PDF
|
| D. Thuthi Sarabai | 303-308 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9632