Home
  Call for Papers
  Editorial Board
  Reviewer Board
  Guidelines for Authors
  Paper Submission
  Registration Fee
  Publications
  Indexing
  About Journal
  Contact Us

All Publications
Volume 1, Issue 1 - Feb 2014
Volume 1, Issue 2 - March 2014
Volume 1, Issue 3 - April 2014
Volume 1, Issue 4 - May 2014
Volume 1, Issue 5 - June 2014
Volume 1, Issue 6 - July 2014
Volume 1, Issue 7 - August 2014
Volume 1, Issue 8 - Sept 2014
Volume 1, Issue 9 - Octo 2014
Volume 1, Issue 10 - Nov 2014
Volume 1, Issue 11 - Dec 2014
Volume 2, Issue 1 - Jan 2015
Volume 2, Issue 2 - Feb 2015
Volume 2, Issue 3 - March 2015
Volume 2, Issue 4 - April 2015
Volume 2, Issue 5 - May 2015
Volume 2, Issue 6 - June 2015
Volume 2, Issue 7 - July 2015
Volume 2, Issue 8 - August 2015
Volume 2, Issue 9 - Sept 2015
Volume 2, Issue 10 - Oct 2015
Volume 2, Issue 11 - Nov 2015
Volume 2, Issue 12 - Dec 2015
Volume 3, Issue 1 - Jan 2016

 


 

IJCAT Paper Publications

     February 2016 Volume 3, Issue 2
 


Latest Volume 3, Issue 3, March 2016 Articles Publication - 09.00 PM on 31st March 2016

 

  Android OS Architecture and Services
 
Ranjit R. Keole Akshata N. Rathod
 
Full Text Paper | Year: February 2016 | Volume 3 Issue 1 | Pages 77-86
   
   
  Digital Notice Board Using Raspberry Pi
 
Jadhav Vinod Nagwanshi Tejas Patil Yogesh Patil Deepak
 
Full Text Paper | Year: February 2016 | Volume 3 Issue 1 | Pages 87-91
   
   
  A Recent Survey on Different Symmetric Key Based Cryptographic Algorithms
 
Pramod Gorakh Patil Vijay Kumar Verma
 
Full Text Paper | Year: February 2016 | Volume 3 Issue 1 | Pages 92-95
   
   
  A Survey on Various Encryption Cryptographic Techniques
 
Ritu Patidar Rupali Dave Anubha Sharma
 
Full Text Paper | Year: February 2016 | Volume 3 Issue 1 | Pages 96-101
   
   
  Time Based Self-Destruction System for Secure Data Sharing in Cloud
 
Harikrishnan G.R Sreeja V. Pavithra T.P Sithara A.P.
 
Full Text Paper | Year: February 2016 | Volume 3 Issue 1 | Pages 102-106
   
   
  A Survey of Secure Network Infrastructure on Different IP Traceback Mechanism for Finding the Location of Spoofers
 
Rajratan Gawai Varsha Bejgam Madhuri Sawant Sujitkumar Patole
 
Full Text Paper | Year: February 2016 | Volume 3 Issue 1 | Pages 107-114
   

 

  Contact  | Terms of Use | Site Map | Nondiscrimination Policy | Help  
IJCAT
   
  Copyright © 2013 IJCAT - All rights reserved. Use of this website signifies your agreement to the terms and conditions