| JCS is an openly accessible and peer-reviewed journal
Editor in Chief: Dr. Ahmad Reza Naghsh Nilchi Managing Editor: Dr. Behrouz Tork Ladani
ISSN Print: 2322-4460 ISSN Online: 2383-0417 Website: http://www.jcomsec.org
|
| ||||
|
|
| ||||
Journal of Computing and Security (JCS) is a peer-reviewed, scientific journal that is committed to publication of original results in all areas of modern computing as well as information security. We are pleased to invite you to submit your original article(s), which is neither previously published nor under consideration for review or publication elsewhere. The notification of acceptance is sent in at most four months period from the date of submission to expedite the publication process. The published issues are in English and distributed worldwide in open access fashion.
| ||||||
| ||||||
Aims and Scope JCS is dedicated to the publication of quality research papers in the area of information technology and computer science and engineering with the focus on the following topics:
| ||||||
| ||||||
| Modern Computing | Information Security | ||||
|
| Algorithms Artificial Intelligence Computer Graphics and Multimedia Computer Modeling and Simulation Computer Networks Data Mining Databases and Semantic Web Digital Image and Speech Processing e-Business and Internet Applications Formal Methods Hardware Design and Simulation High Performance Computing and Distributed Systems Intelligent Robotics Neural Networks and Fuzzy logic Pattern Recognition Software Engineering Symbolic Computation Theory of Computing Wireless Communications and Ad Hoc Networks |
| Authentication and Access Control Cryptanalysis Cryptographic Algorithms Formal and Provable Security Analysis Information Warfare and Survivability Internet Applications Security Intrusion Detection Mathematics of Cryptology Network and Communication Security OS and Database Security Privacy and Anonymity Security in Pervasive Computing Security Protocols Software Security Steganography and Watermarking Trust Modeling Vulnerability and Risk Management
| ||
|
| |||||
To expedite the publication process and reduce the formatting related tasks for our contributors, the initial submitted papers could be in word or PDF formats. Authors may also use IEEE, Springer or ACM templates. Paper(s) must, however, be written in English. For submission, you should first register in the editorial system from here. I you have already registered please login and then select the new submission link.
| ||||||
| ||||||
Contact Info Website: http://www.jcomsec.org Email: info@jcomsec.org Tel: +98 311 7934558 Fax: +98 31 37932670 | ||||||
Vol 3, No 4 (2016): October 2016
Table of Contents
Peer-reviewed Articles
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol | PDF PERSIAN_ABS |
Samad Rostampour, Nasour Bagheri, Mehdi Hosseinzadeh, Ahmad Khademzadeh |
Multicollision Attack on a recently proposed hash function vMDC-2 | PDF PERSIAN_ABS |
Zahra Zolfaghari, Hamid Asadollahi, Nasour Bagheri |
Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks | PDF PERSIAN_ABS |
Narges Mehran, Naser Movahhedinia |
Persian Texts Part of Speech Tagging Using Artificial Neural Networks | PDF PERSIAN_ABS |
Zahra Hosseini Pozveh, Amirhassan Monadjemi, Ali Ahmadi |
ISSN: 2383-0417