Vol 7, No 3 (2015)

Table of Contents

Vol 7, No 3 (2015)

Open Access Open Access  Restricted Access Subscription Access

Articles

Threat Modeling-A Survey
Pooja Lahoti, Pragya Shukla
 Vol 7, No 3 (2015), Pagination: 63-65
ABSTRACT |  PDF     Abstract Views: 169  |  PDF Views: 3
A Unique Solution for Clickjacking Attack Using Regex Based Code Crawler
B. V. Ramaraju, S. Suganya
 Vol 7, No 3 (2015), Pagination: 66-69
ABSTRACT |  PDF     Abstract Views: 145  |  PDF Views: 3
Privacy Preserving Firewall Optimization over Cross Domains
J. Dhyaneshwaran, S. Saravanakumar, N. Selvaraj, S. Arulbalamurugan
 Vol 7, No 3 (2015), Pagination: 70-73
ABSTRACT |  PDF     Abstract Views: 135  |  PDF Views: 2
Reduction of Test Data Volume Based On Viterbi Compression Algorithm
K. S. Neelukumari, A. Pavithra, N. Saranya, S. Vanitha
 Vol 7, No 3 (2015), Pagination: 74-79
ABSTRACT |  PDF     Abstract Views: 140  |  PDF Views: 3
High Speed Floating Point Multiplier
P. Karthika Rani, S. Ramya, V. Saranya, N. Priya
 Vol 7, No 3 (2015), Pagination: 80-83
ABSTRACT |  PDF     Abstract Views: 150  |  PDF Views: 3
Efficient Layout of Fredkin Gate with Minimized Area Methodologies
P. Anusuya, M. Arunmozhi Devi
 Vol 7, No 3 (2015), Pagination: 84-88
ABSTRACT |  PDF     Abstract Views: 151  |  PDF Views: 3
BITSTREAMS Compression of RLE with Bitstuffing
J. Satheesh Kumar, G. Saravana Kumar, R. S. Madhunica, K. Prakash, E. Deepa, K. Rajesh
 Vol 7, No 3 (2015), Pagination: 89-91
ABSTRACT |  PDF     Abstract Views: 184  |  PDF Views: 3