•  
  •  
 

International Journal of Computer and Communication Technology

Volume 5, Issue 1 (2014)

Articles

PDF

Crypto Steganography using linear algebraic equation
Pradeep Kumar Mallick and N.K. kamila
DOI: 10.47893/IJCCT.2014.1211

PDF

Standardized Biometric Templates in Indian Scenario: Interoperability Issues and Solutions
Zia Saquib, Santosh Kumar Soni, Sweta Suhasaria, and Anamika Singh
DOI: 10.47893/IJCCT.2014.1212

PDF

Incorporating FCM and Back Propagation Neural Network for Image Segmentation
Ebrahim. Aghajari and Dr.Mrs. Gharpure Damayanti
DOI: 10.47893/IJCCT.2014.1213

PDF

Performance Evaluation of Computation Intensive Tasks in Grid
P. Raghu and K. Sriram
DOI: 10.47893/IJCCT.2014.1214

PDF

A Mathematical Model for Randomly-Occurring Low-Rate Denial of Service Attacks
Nahush Chaturvedi and Hrushikesha Mohanty
DOI: 10.47893/IJCCT.2014.1215

PDF

A Secure Short Signature Scheme Based upon Biometric Security
Mousumi Parida and Sujata Mohanty
DOI: 10.47893/IJCCT.2014.1216

PDF

People, SHGs and Social Objectives: A Formal Framework
A B. Sagar and Hrushikesha Mohanty
DOI: 10.47893/IJCCT.2014.1217

PDF

Coding Schemes for Distributed Storage Systems: Implementation and Improvements
Saman Tabatabaeian, Rajendra P. Lal, and Wilson Naik
DOI: 10.47893/IJCCT.2014.1218

PDF

Open source Software ADOPTION: an academic perspective
Deepika Satyarajan and Vishwesh Akre
DOI: 10.47893/IJCCT.2014.1219

PDF

Event Based Approach for Web Services Composition
A. Vani Vathsala and Hrushikesha Mohanty
DOI: 10.47893/IJCCT.2014.1220

PDF

A Shared-Disk Database Approach towards Securing Data in the Cloud
Debi Prasad Mishra, Ranjita Mishra, and Animesh Tripathy
DOI: 10.47893/IJCCT.2014.1221

IJCCT Cover Art