Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
ISSUE MANUSCRIPTS
VOLUME - 3 ISSUE - 6 | ||||
Publication Date - January 2010 | Pages - 448 -594 Download Complete Issue (4.9MB) |
||||
14 Records found in CSC-OpenAccess Library. | ||||
A Wavelet - Based Object Watermarking System for MPEG4 Video | ||||
Essaouabi Abdessamad, E.Ibnelhaj, F.Regragui | ||||
Pages - 448 - 461 | Revised - 30-12-2009 | Published - 31-01-2010 | ||||
Full Text Available (548.34KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
High Capacity and Security Steganography Using Discrete Wavelet Transform | ||||
H S Manjunatha Reddy, K B Raja | ||||
Pages - 462 - 472 | Revised - 10-11-2009 | Published - 12-12-2009 | ||||
Full Text Available (377.58KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Hybrid Compression Encryption Technique for Securing SMS | ||||
Tarek, Bahgat A. Abdel-latef, Awny A. Ahmed, Ahmed M Mahfouz | ||||
Pages - 473 - 481 | Revised - 30-12-2009 | Published - 31-01-2010 | ||||
Full Text Available (137.18KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
On the Usage of Chained Codes in Cryptography | ||||
Omessaad Hamdi, Ammar Bouallegue, Sami Harari | ||||
Pages - 482 - 490 | Revised - 30-12-2009 | Published - 31-01-2010 | ||||
Full Text Available (124.87KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Parallel Framework For Multilayer Perceptron For Human Face Recognition | ||||
Mrinal Kanti Bhowmik, Debotosh Bhattacharjee , Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu | ||||
Pages - 491 - 507 | Revised - 30-12-2009 | Published - 31-01-2010 | ||||
Full Text Available (296.66KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Novel Method for Quantitative Assessment of Software Quality | ||||
C. V. Srikrishna, Neelam Bawane | ||||
Pages - 508 - 517 | Revised - 30-12-2009 | Published - 31-01-2010 | ||||
Full Text Available (131.46KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Hierarchical Non-blocking Coordinated Checkpointing Algorithms for Mobile Distributed Computing | ||||
Surender, R.K. Chauhan, Parveen Kumar | ||||
Pages - 518 - 524 | Revised - 30-12-2009 | Published - 31-01-2010 | ||||
Full Text Available (95.43KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Implementation of Agent Based Dynamic Distributed Service | ||||
Ravi Prakash Reddy, A.Damodaram | ||||
Pages - 525 - 535 | Revised - 30-12-2009 | Published - 31-01-2010 | ||||
Full Text Available (213.71KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Havoc Proof for Secure and Robust Audio Watermarking | ||||
K.Vaitheki, R.Tamijetchelvy | ||||
Pages - 536 - 549 | Revised - 30-12-2009 | Published - 31-01-2010 | ||||
Full Text Available (236.72KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy Prevention | ||||
Vineet Kumar Sharma, S.A.M. Rizvi, S. Zeeshan Hussain, Vignesh | ||||
Pages - 550 - 558 | Revised - 30-12-2009 | Published - 31-01-2010 | ||||
Full Text Available (104.49KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Knowledge Discovery Through Data Visualization Of Drive Test Data | ||||
Shalini Saxena, Abhijit S. Pandya, Robert Stone, Saeed Rajput, Sam Hsu | ||||
Pages - 559 - 568 | Revised - 12-02-2010 | Published - 19-02-2010 | ||||
Full Text Available (828.98KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A lexisearch algorithm for the Bottleneck Traveling Salesman Problem | ||||
Zakir H. Ahmed | ||||
Pages - 569 - 577 | Revised - 22-01-2010 | Published - 22-02-2010 | ||||
Full Text Available (111.8KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party | ||||
Ajay Sharma, Ramveer Singh, Awakash Mishra, Abhishek Dwivedi, Deo Brat Ojha, Shree Garg | ||||
Pages - 578 - 582 | Revised - 08-02-2010 | Published - 08-03-2010 | ||||
Full Text Available (92.93KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method | ||||
Asfandyar Khan, Nurul Hasan, Azween Abdullah | ||||
Pages - 583 - 594 | Revised - 08-02-2010 | Published - 08-03-2010 | ||||
Full Text Available (1.48MB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||