Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
November 30, 2024

NOTIFICATION
December 31, 2024

PUBLICATION
January 31, 2025

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.645

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

IJCSS - Editorial Board Member (EBM)

Professor Ren-Junn Hwang
Tamkang University - Taiwan
Contact Details
Email - victor@gms.tku.edu.tw
Department of Computer Science and Information Engineering Tamkang University , 151, Ying-Chuan Road ,Tamsui Dist., New Taipei City Taiwan 25137, R.O.C.
Taiwan

About Professor Ren-Junn Hwang

Ren-Junn Hwang received his Ph. D. in Computer Science in 1998 from National Chung Cheng University, Chiayi, Taiwan. He worked as a professor of the Department of Computer Science and Information Engineering at TamKang University, New Taipei City, Taiwan. Pro. Hwang also serves as the Secretary-General of The Chinese Cryptology and Information Security Association since June 2012. Pro. Hwang is a member of IEEE, IEICE and the Phi Tau Phi Society of the Republic of China. His research interests include network security, computer cryptography, mobile network security, Ad hoc network security, Cloud computing security.

Professor Ren-Junn Hwang handles review of manuscripts that are submitted under the following topics.

  • Authentication and authorization models
  • Communications and data security
  • Computer security
  • Cryptography