•  
  •  
 

International Journal of Computer and Communication Technology

Volume 3, Issue 2 (2012)

Articles

PDF

E-Learning: A Milestone in the Research of Data Mining
Sabyasachi Pattnaik, Jui Pattnayak, and Priyaranjan Dash

PDF

E-Services for the Visually Challenged in India:Current Scenario and the Road Ahead
Sohag Sundar Nanda, Basanta Kumar Swain, and Sanghamitra Mohanty

PDF

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS: A REVIEW
JASPAL KUMAR, M. KULKARNI, and DAYA GUPTA

PDF

Applications of Two Dimensional Cellular Automata rules for Block Cipher in Cryptography
Sambhu Prasad Panda, Madhusmita Sahu, and Manas Kumar Swain

PDF

A Technique for Secure Communication Using Message Dependent Steganography
Gandharba Swain, Dodda Ravi Kumar, Anita Pradhan, and Saroj Kumar Lenka

PDF

Cryptanalysis of the Fast Lightweight Mutual Authentication Protocol
Masoumeh Safkhani, Majid Naderi, and Habib F. Rashvand

PDF

NON LINEAR FEEDBACK STREAM CIPHER
.R. Siva Ram Prasad, G. Murali, and S. Gopi Krishna

PDF

Cognitive States from Brain Images : SVM Approach
Ramakrushna Swain, Lambodar Jena, and Narendra K. Kamila

PDF

Improved Self-certified Partially Blind Signature Scheme
Binayak Kar, Pritam Prava Sahoo, and Asif Uddin Khan

IJCCT Cover Art