Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)

Number of Volumes

8

Number of Issues

22

Number of Articles

107

Number of Contributors

217

Article View

85,792

PDF Download

21,364

View Per Article

801.79

PDF Download Per Article

199.66

-----------------------------------------

Number of Submissions

344

Rejected Submissions

48

Reject Rate

14

Accepted Submissions

101

Acceptance Rate

29

Number of Indexing Databases

7

Number of Reviewers

391

 http://jcomsec.org


Journal of Computing and Security (JCS) is a peer-reviewed, scientific journal that is committed to publication of original results in all areas of modern computing as well as information security. We are pleased to invite you to submit your original article(s), which is neither previously published nor under consideration for review or publication elsewhere. The notification of acceptance is sent in at most four months period from the date of submission to expedite the publication process. The published issues are in English and distributed worldwide in open access fashion.

NOTE: Submissions to this journal are free of charge.

 

 

BAS: An Answer Selection Method Using BERT Language Model
1. BAS: An Answer Selection Method Using BERT Language Model

Jamshid Mozafari; Afsaneh Fatemi; Mohammad Ali Nematbakhsh

Volume 8, Issue 2 , Summer and Autumn 2021, Pages 1-18

http://dx.doi.org/10.22108/jcs.2021.128002.1066

Abstract
  In recent years, Question Answering systems have become more popular and widely used by users. Despite the increasing popularity of these systems, their performance is not even sufficient ...  Read More
Signature Codes for Energy-Efficient Data Movement in On-chip Networks
1. Signature Codes for Energy-Efficient Data Movement in On-chip Networks

Masoud Dehyadegari

Volume 7, Issue 2 , Summer and Autumn 2020, , Pages 95-101

http://dx.doi.org/10.22108/jcs.2020.120813.1041

Abstract
  On-chip networks provide a scalable infrastructure for moving data among cores in many-core systems. In future technologies, significant amounts of dynamic energy are dissipated for ...  Read More
A Context Model for Business Process Adaptation based on Ontology Reasoning
2. A Context Model for Business Process Adaptation based on Ontology Reasoning

Leila Kord Toudeshki; Mir Ali Seyyedi; Afshin Salajegheh

Volume 7, Issue 2 , Summer and Autumn 2020, , Pages 119-140

http://dx.doi.org/10.22108/jcs.2021.124660.1056

Abstract
  The surrounding context information of business processes is unpredictable and dynamically changing over time. Therefore, they should dynamically adapt themselves to different changes ...  Read More
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis
3. Toward A More Efficient Gröbner-based Algebraic Cryptanalysis

Hossein Arabnezhad; Babak Sadeghian

Volume 7, Issue 2 , Summer and Autumn 2020, , Pages 103-117

http://dx.doi.org/10.22108/jcs.2020.123673.1050

Abstract
  In this paper, we propose a new method to launch a more efficient algebraic cryptanalysis. Algebraic cryptanalysis aims at finding the secret key of a cipher by solving a collection ...  Read More
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness
4. Momentum Contrast Self-Supervised Based Training for Adversarial Robustness

Monireh Moshavash; Mahdi Eftekhari; Kaveh Bahraman

Volume 8, Issue 1 , Winter and Spring 2021, , Pages 33-43

http://dx.doi.org/10.22108/jcs.2021.126680.1063

Abstract
  By the rapid progress of deep learning and its use in a variety of applications, however, deep networks have shown that they are vulnerable to adversarial examples. Recently developed ...  Read More
Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m)
5. Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m)

Hashem Rezaei; Alireza Shafieinejad

Volume 8, Issue 1 , Winter and Spring 2021, , Pages 1-18

http://dx.doi.org/10.22108/jcs.2021.123698.1051

Abstract
  Elliptic curve cryptography (ECC) is one of the most popular public key systems in recent years due to its both high security and low resource consumption. Thus, ECC is more appropriate ...  Read More

Keywords Cloud