Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
April 30, 2024

NOTIFICATION
May 31, 2024

PUBLICATION
June 30, 2024

    
HOME   About IJS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJS CITATION IMPACT
3.248

Refer to In-Process Citation Report for IJS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 5   ISSUE - 1    
Publication Date - May / June 2011      |       Pages - 1 - 51
Download Complete Issue    (864.83KB)
   
     
     
     
4 Records found in CSC-OpenAccess Library.    
     
     
A New Watermarking Approach Based on Combination of Reversible Watermarking and CDMA in Spatial and DWT Domain    
S.Bekkouche, A.Chouarfia    
Pages - 1 - 12     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (459.35KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
An Exploratory Study of the Security Management Practices of Hispanic Students    
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert Crossler, Jesus Tanguma    
Pages - 13 - 21     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (95.86KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Medical Information Security    
William C Figg, Hwee Joo Kam    
Pages - 22 - 34     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (236.3KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobile Networks    
Mustafa Fayomi, Jaafer AL-Saraireh    
Pages - 35 - 51     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (191.14KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles