Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
ISSUE MANUSCRIPTS
VOLUME - 4 ISSUE - 4 | ||||
Publication Date - October 2010 | Pages - 373 -435 Download Complete Issue (2.76MB) |
||||
6 Records found in CSC-OpenAccess Library. | ||||
Deploying E-Mail as an Official Communication Tool: Technical Prospect | ||||
wasan shaker awad | ||||
Pages - 373 - 384 | Revised - 30-08-2010 | Published - 30-10-2010 | ||||
Full Text Available (105.25KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Lower Bound Study on Software Development Effort | ||||
Lung-Lung Liu | ||||
Pages - 383 - 391 | Revised - 30-08-2010 | Published - 30-10-2010 | ||||
Full Text Available (142.13KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Steganography using Dictionary Sort on Vector Quantized Codebook | ||||
H.B.Kekre, Archana Athawale, Tanuja Sarode, Sudeep Thepade, Kalpana Sagvekar | ||||
Pages - 392 - 402 | Revised - 30-08-2010 | Published - 30-10-2010 | ||||
Full Text Available (414.29KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Cutting Edge Practices for Secure Software Engineering | ||||
Kanchan Hans | ||||
Pages - 403 - 408 | Revised - 30-08-2010 | Published - 30-10-2010 | ||||
Full Text Available (135.58KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Remodeling of Elliptic Curve Cryptography Scalar Multiplication Architecture using Parallel Jacobian Coordinate System | ||||
Adnan Abdul-Aziz Gutub | ||||
Pages - 409 - 425 | Revised - 30-08-2010 | Published - 30-10-2010 | ||||
Full Text Available (199.66KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Automated Detection System for SQL Injection Attacks | ||||
K.V.N.Sunitha, M. Sridevi | ||||
Pages - 426 - 435 | Revised - 30-08-2010 | Published - 30-10-2010 | ||||
Full Text Available (460.12KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||