Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
April 30, 2019

NOTIFICATION
May 31, 2019

PUBLICATION
June 30, 2019

HOME   About IJS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJS

CITATION ANALYSIS

IJS Citation Impact
(406 - 0) / 101 = 4.020

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academic Index
CiteSeerX
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 5   ISSUE - 1    
Publication Date - May / June 2011      |       Pages - 1 - 51
Download Complete Issue    (864.83KB)
   
     
     
     
4 Records found in CSC-OpenAccess Library.    
     
     
A New Watermarking Approach Based on Combination of Reversible Watermarking and CDMA in Spatial and DWT Domain    
S.Bekkouche, A.Chouarfia    
Pages - 1 - 12     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (459.35KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
An Exploratory Study of the Security Management Practices of Hispanic Students    
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert Crossler, Jesus Tanguma    
Pages - 13 - 21     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (95.86KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Medical Information Security    
William C Figg, Hwee Joo Kam    
Pages - 22 - 34     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (236.3KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobile Networks    
Mustafa Fayomi, Jaafer AL-Saraireh    
Pages - 35 - 51     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (191.14KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles