Vol. 5, No. 2 April 2016
Table of Contents
Accepted Refereed Research Articles
An Interactive Cognitive Approach to Evaluate the State Space of the Solutions | |
Humera Farooq , Muhammad Tariq Siddique | 1-6 |
Comparison Of Three Modes Of Cryptography Operation For Providing Security and Privacy Based on Important Factors | |
Anita Dashti, Hashem Alvandi Kheradmand Mohammad Davarpanah Jazi | 7-11 |
Providing Safe, Secure and Trusted Communication among Vehicular Ad-hoc Networks’ Users A Vision Paper | |
Amit Kumar Tyagi, Dr .N. Sreenath | 12-21 |
Comparison of Traditional RE with Agile RE | |
Nosheen Khan Ahthasham Sajid, Natasha Khan | 22-27 |
Acceptance Test Driven Development in Web Based Banking Applications | |
Nosheen Khan Ahthasham Sajid, Natasha Khan | 28-33 |