

Table of Contents
Articles
Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography |
PDF
![]() |
Tarun Dhar Diwan, Aaqib Rshid, Vinay Sahu | 278-281 |
A Futuristic Digital Forensic Software Framework for Analyzing the Registry of Windows Based Systems |
PDF
![]() |
Sangita M. Tabarno, Ashish K. Sharma, Nilmani Verma | 282-286 |
Secure Comprehensive File Distribution Schemes for Network Coding Driven P2P Systems |
PDF
![]() |
Pavan Kumar Zammalamadaka, Yuva Krishna Aluri | 287-291 |
Delaunay Overlays for P2P Streaming Services |
PDF
![]() |
Bala Karthikeya Kesanapalli, Divya Adusumilli | 292-295 |
Performance Metrics in Software Testing |
PDF
![]() |
D. Thuthi Sarabai | 303-308 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9632