Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
November 30, 2018

NOTIFICATION
December 31, 2018

PUBLICATION
January 31, 2019

HOME   About IJS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJS

CITATION ANALYSIS

IJS Citation Impact
(406 - 0) / 101 = 4.020

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Directory of Open Access Journals (DOAJ)
Google Scholar
Academic Journals Database
ScientificCommons
Academic Index
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 1   ISSUE - 1    
Publication Date - June 2007      |       Pages - 1 - 44
Download Complete Issue    (1.93MB)
   
     
     
     
4 Records found in CSC-OpenAccess Library.    
     
     
Performance Analysis of Mobile Security Protocols: Encryption and Authentication.    
Anita Singhrova, Nupur Prakash    
Pages - 1 - 13     |    Revised - 15-06-2007     |    Published - 30-06-2007    
Full Text Available  (163.55KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.    
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy    
Pages - 14 - 21     |    Revised - 15-06-2007     |    Published - 30-06-2007    
Full Text Available  (89.17KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Multi-Dimensional Privacy Protection for Digital Collaborations.    
Geoff Skinner    
Pages - 22 - 31     |    Revised - 15-06-2007     |    Published - 30-06-2007    
Full Text Available  (801.22KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Modified Approach For Securing Real Time Application On Clusters.    
Abhishek Songra, Rama Shankar Yadav, Sarsij Tripathi    
Pages - 32 - 44     |    Revised - 15-06-2007     |    Published - 30-06-2007    
Full Text Available  (373.45KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles