The Standard International Journals
(The SIJ)

The SIJ Transactions on Computer Science Engineering & its Applications (CSEA)

Print ISSN: 2321-2373 | Online ISSN: 2321-2381


Volume 2; Issue 5; July, 2014


A Privacy-Preserving Unpadded RSA based-Third Party Auditing Protocol for Cloud Storage Secure

Varampati Deepa, P. Jyotheeswari & Vikram Neerugatti

Keywords: Aesthetic Judgment; Creativity Evaluation; Interior Design; Visual Preference.

To Cite this Article, copy and paste the following:

Varampati Deepa, P. Jyotheeswari & Vikram Neerugatti (2014), "A Privacy-Preserving Unpadded RSA based-Third Party Auditing Protocol for Cloud Storage Secure", The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), The Standard International Journals (The SIJ), Vol. 2, No. 5, Pp. 171-176.

Click here to View Manuscript


How Citizens' Perception is Influenced by the Sense of Belonging and Identity to Urban Deteriorated Texture (Case Study: Sarshoor District in Mashad)

Seyedamir Kaboli Farshchi, Mohammadreza Mabhoot & Ali Ahmadi Rastegar

Keywords: Deteriorated Texture; Identity; Perception; Place; Sense of Belonging.

To Cite this Article, copy and paste the following:

Seyedamir Kaboli Farshchi, Mohammadreza Mabhoot & Ali Ahmadi Rastegar (2014), "How Citizens' Perception is Influenced by the Sense of Belonging and Identity to Urban Deteriorated Texture (Case Study: Sarshoor District in Mashad)", The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), The Standard International Journals (The SIJ), Vol. 2, No. 5, Pp. 177-181.

Click here to View Manuscript


A Path Protection Method using Congestion Control in IP/MPLS Networks as an Underlying Network in Smart Grids

B. Mobasheri & M.H. Yaghmaee Moghadam

Keywords: Failure Tolerance; Multiple Path Failures; Packet Loss; Priority Levels; Smart Grids.

To Cite this Article, copy and paste the following:

B. Mobasheri & M.H. Yaghmaee Moghadam (2014), "A Path Protection Method using Congestion Control in IP/MPLS Networks as an Underlying Network in Smart Grids", The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), The Standard International Journals (The SIJ), Vol. 2, No. 5, Pp. 182-189.

Click here to View Manuscript


Presentation of a Two-Party Key Agreement Protocol based on Chaos

Nahid Yahyapoor, Saeed Shaerbaf & Morteza Nikooghadam

Keywords: Chebyshev Chaotic Map; Cryptography; Key Agreement Protocol; Logistic Chaotic Map; Security; Session Key.

To Cite this Article, copy and paste the following:

Nahid Yahyapoor, Saeed Shaerbaf & Morteza Nikooghadam (2014), "Presentation of a Two-Party Key Agreement Protocol based on Chaos", The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), The Standard International Journals (The SIJ), Vol. 2, No. 5, Pp. 190-194.

Click here to View Manuscript


Adoption of Computer based Model for Monitoring Parking Revenue Inflow

Abanti Cyrus & Peter Sungu Nyakomitta

Keywords: COBABRI; Computer-based; Inflow; Revenue.

To Cite this Article, copy and paste the following:

Abanti Cyrus & Peter Sungu Nyakomitta (2014), "Adoption of Computer based Model for Monitoring Parking Revenue Inflow", The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), The Standard International Journals (The SIJ), Vol. 2, No. 5, Pp. 195-201.

Click here to View Manuscript