Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
March 31, 2024

NOTIFICATION
April 30, 2024

PUBLICATION
May 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.691

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 4   ISSUE - 1    
Publication Date - March 2010      |       Pages - 1 - 148
Download Complete Issue    (3.86MB)
   
     
     
     
12 Records found in CSC-OpenAccess Library.    
     
     
Cache Coherency in Distriuted File System    
Anagha Kulkarni    
Pages - 1 - 8     |    Revised - 25-02-2010     |    Published - 26-03-2010    
Full Text Available  (86.15KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Secured Smart Card using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES    
Ehab Mahmoud Mohamed, Yasien Mahmoud, Hiroshi Furukawa    
Pages - 9 - 22     |    Revised - 25-02-2010     |    Published - 26-03-2010    
Full Text Available  (187.85KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
An Overview of Registration Based and Registration Free Methods for Cancelable Fingerprint Template    
Radhika Bhagwat    
Pages - 23 - 30     |    Revised - 25-02-2010     |    Published - 26-03-2010    
Full Text Available  (364.85KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Verifying ODP Computational Behavioral Specification by using B-Method    
Jalal Laassiri, Saïd El Hajji, Mohamed Bouhdadi    
Pages - 31 - 39     |    Revised - 25-02-2010     |    Published - 26-03-2010    
Full Text Available  (376.1KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Novel Image Steganography Method with Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys    
Yogendra Kumar Jain    
Pages - 40 - 49     |    Revised - 25-02-2010     |    Published - 26-03-2010    
Full Text Available  (120.31KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Multi-Operator Based Simulated Annealing Approach for Robot Navigation in Uncertain Environments    
Hui Miao    
Pages - 50 - 61     |    Revised - 25-02-2010     |    Published - 03-04-2010    
Full Text Available  (885.77KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Estimation of Ready Queue Processing Time Under Systematic Lottery Scheduling Scheme    
D. Shukla, Anjali Jain    
Pages - 74 - 81     |    Revised - 25-02-2010     |    Published - 26-03-2010    
Full Text Available  (117.16KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Detecting and Localizing Wireless Network Attacks Techniques    
Iyad Aldasouqi, Walid Salameh    
Pages - 82 - 97     |    Revised - 25-02-2010     |    Published - 26-03-2010    
Full Text Available  (507.14KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
An ID-based Blind Signature Scheme from Bilinear Pairings    
B.Umaprasada Rao, K.A.Ajmath    
Pages - 98 - 106     |    Revised - 25-02-2010     |    Published - 31-03-2010    
Full Text Available  (98.85KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Recognition of Non-Compound Handwritten Devnagari Characters using a Combination of MLP and Minimum Edit Distance    
Sandhya Arora, Debotosh Bhattacharjee, Mita Nasipuri, D. K. Basu, M.Kundu    
Pages - 107 - 120     |    Revised - 25-02-2010     |    Published - 03-04-2010    
Full Text Available  (728.28KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Development of Expert Search Engine for Web Environment    
Laxmi, Gr. Noiida    
Pages - 130 - 135     |    Revised - 25-02-2010     |    Published - 07-04-2010    
Full Text Available  (165.34KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
On the use of Continued Fractions for Electronic Cash.    
Amadou Moctar Kane    
Pages - 136 - 148     |    Revised - 25-02-2010     |    Published - 07-04-2010    
Full Text Available  (113.2KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles