Vol. 5, No. 2 April 2016
Table of Contents
Accepted Refereed Research Articles
| An Interactive Cognitive Approach to Evaluate the State Space of the Solutions | |
| Humera Farooq , Muhammad Tariq Siddique | 1-6 |
| Comparison Of Three Modes Of Cryptography Operation For Providing Security and Privacy Based on Important Factors | |
| Anita Dashti, Hashem Alvandi Kheradmand Mohammad Davarpanah Jazi | 7-11 |
| Providing Safe, Secure and Trusted Communication among Vehicular Ad-hoc Networks’ Users A Vision Paper | |
| Amit Kumar Tyagi, Dr .N. Sreenath | 12-21 |
| Comparison of Traditional RE with Agile RE | |
| Nosheen Khan Ahthasham Sajid, Natasha Khan | 22-27 |
| Acceptance Test Driven Development in Web Based Banking Applications | |
| Nosheen Khan Ahthasham Sajid, Natasha Khan | 28-33 |

