Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2025
|
|||||
| ARTICLE PROCESSING CHARGES (APC) TIER#1: $150 | TIER#2: $100. See more details. |
|||||

| HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
||||||||||||||||||||||||||||||||
ISSUE MANUSCRIPTS
| VOLUME - 4 ISSUE - 1 | ||||
| Publication Date - March 2010 | Pages - 1 - 148 Download Complete Issue |
||||
| 12 Records found in CSC-OpenAccess Library. | ||||
| Cache Coherency in Distriuted File System | ||||
| Anagha Kulkarni | ||||
| Pages - 1 - 8 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| A Secured Smart Card using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES | ||||
| Ehab Mahmoud Mohamed, Yasien Mahmoud, Hiroshi Furukawa | ||||
| Pages - 9 - 22 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| An Overview of Registration Based and Registration Free Methods for Cancelable Fingerprint Template | ||||
| Radhika Bhagwat | ||||
| Pages - 23 - 30 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Verifying ODP Computational Behavioral Specification by using B-Method | ||||
| Jalal Laassiri, Saïd El Hajji, Mohamed Bouhdadi | ||||
| Pages - 31 - 39 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| A Novel Image Steganography Method with Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys | ||||
| Yogendra Kumar Jain | ||||
| Pages - 40 - 49 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| A Multi-Operator Based Simulated Annealing Approach for Robot Navigation in Uncertain Environments | ||||
| Hui Miao | ||||
| Pages - 50 - 61 | Revised - 25-02-2010 | Published - 03-04-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Estimation of Ready Queue Processing Time Under Systematic Lottery Scheduling Scheme | ||||
| D. Shukla, Anjali Jain | ||||
| Pages - 74 - 81 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Detecting and Localizing Wireless Network Attacks Techniques | ||||
| Iyad Aldasouqi, Walid Salameh | ||||
| Pages - 82 - 97 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| An ID-based Blind Signature Scheme from Bilinear Pairings | ||||
| B.Umaprasada Rao, K.A.Ajmath | ||||
| Pages - 98 - 106 | Revised - 25-02-2010 | Published - 31-03-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Recognition of Non-Compound Handwritten Devnagari Characters using a Combination of MLP and Minimum Edit Distance | ||||
| Sandhya Arora, Debotosh Bhattacharjee, Mita Nasipuri, D. K. Basu, M.Kundu | ||||
| Pages - 107 - 120 | Revised - 25-02-2010 | Published - 03-04-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Development of Expert Search Engine for Web Environment | ||||
| Laxmi, Gr. Noiida | ||||
| Pages - 130 - 135 | Revised - 25-02-2010 | Published - 07-04-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| On the use of Continued Fractions for Electronic Cash. | ||||
| Amadou Moctar Kane | ||||
| Pages - 136 - 148 | Revised - 25-02-2010 | Published - 07-04-2010 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
