Submit Paper

Article Processing Fee

Pay Online


Crossref logo

  DOI Prefix   10.20431


International Journal of Research Studies in Computer Science and Engineering

Volume-2 Issue-1, 2015

Broadband Internet Penetration in Nigeria: A Review
Chinecherem Umezuruike, Awodele Oludele, Kuyoro S. O., Izang Aaron A

Policies Based Privacy Control Mechanisms for Social
Srikar Swamy, G. Suday Kiran

Vendor Lock in Winds Relocation to Meta Cloud
Ravi Kumar.K, K. Bheemalingappa
Download | Full Text HTML | Page No : 13-17

Data Security for Unreliable Clouds Using Reliable Encryption
Veeresh, K. Arjun
Download | Full Text HTML | Page No : 18-21

Gaps of Cryptography and Their Automatic Treatments with Reference to Classical Cryptography Methods
Dr. Mozamel M. Saeed
Download | Full Text HTML | Page No : 22-28

Fast Computation of Cubic Bernstein Polynomials in CNC Interpolation
ZENG Yu, WANG Xingbo
Download | Full Text HTML | Page No : 29-34