Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
ISSUE MANUSCRIPTS
VOLUME - 4 ISSUE - 1 | ||||
Publication Date - March 2010 | Pages - 1 - 148 Download Complete Issue (3.86MB) |
||||
12 Records found in CSC-OpenAccess Library. | ||||
Cache Coherency in Distriuted File System | ||||
Anagha Kulkarni | ||||
Pages - 1 - 8 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
Full Text Available (86.15KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Secured Smart Card using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES | ||||
Ehab Mahmoud Mohamed, Yasien Mahmoud, Hiroshi Furukawa | ||||
Pages - 9 - 22 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
Full Text Available (187.85KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
An Overview of Registration Based and Registration Free Methods for Cancelable Fingerprint Template | ||||
Radhika Bhagwat | ||||
Pages - 23 - 30 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
Full Text Available (364.85KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Verifying ODP Computational Behavioral Specification by using B-Method | ||||
Jalal Laassiri, Saïd El Hajji, Mohamed Bouhdadi | ||||
Pages - 31 - 39 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
Full Text Available (376.1KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Novel Image Steganography Method with Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys | ||||
Yogendra Kumar Jain | ||||
Pages - 40 - 49 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
Full Text Available (120.31KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Multi-Operator Based Simulated Annealing Approach for Robot Navigation in Uncertain Environments | ||||
Hui Miao | ||||
Pages - 50 - 61 | Revised - 25-02-2010 | Published - 03-04-2010 | ||||
Full Text Available (885.77KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Estimation of Ready Queue Processing Time Under Systematic Lottery Scheduling Scheme | ||||
D. Shukla, Anjali Jain | ||||
Pages - 74 - 81 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
Full Text Available (117.16KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Detecting and Localizing Wireless Network Attacks Techniques | ||||
Iyad Aldasouqi, Walid Salameh | ||||
Pages - 82 - 97 | Revised - 25-02-2010 | Published - 26-03-2010 | ||||
Full Text Available (507.14KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
An ID-based Blind Signature Scheme from Bilinear Pairings | ||||
B.Umaprasada Rao, K.A.Ajmath | ||||
Pages - 98 - 106 | Revised - 25-02-2010 | Published - 31-03-2010 | ||||
Full Text Available (98.85KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Recognition of Non-Compound Handwritten Devnagari Characters using a Combination of MLP and Minimum Edit Distance | ||||
Sandhya Arora, Debotosh Bhattacharjee, Mita Nasipuri, D. K. Basu, M.Kundu | ||||
Pages - 107 - 120 | Revised - 25-02-2010 | Published - 03-04-2010 | ||||
Full Text Available (728.28KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Development of Expert Search Engine for Web Environment | ||||
Laxmi, Gr. Noiida | ||||
Pages - 130 - 135 | Revised - 25-02-2010 | Published - 07-04-2010 | ||||
Full Text Available (165.34KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
On the use of Continued Fractions for Electronic Cash. | ||||
Amadou Moctar Kane | ||||
Pages - 136 - 148 | Revised - 25-02-2010 | Published - 07-04-2010 | ||||
Full Text Available (113.2KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||