Research Article
Security Analysis of Two Lightweight Certificateless Signature Schemes
Security Analysis of Two Lightweight Certificateless Signature Schemes

Nasrollah Pakniat

Volume 5, Issue 2 , July 2018, Pages 59-65

http://dx.doi.org/10.22108/jcs.2019.110889.

Abstract
  Certificateless cryptography can be considered as an intermediate solution to overcome the issues in traditional public key infrastructure (PKI) and identity-based public key cryptography ...  Read More
Research Article
An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences
An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences

Yousef Rastegari

Volume 5, Issue 2 , July 2018, Pages 67-79

http://dx.doi.org/10.22108/jcs.2018.106853.0

Abstract
  Service-based application (SBA) is composed of software services, and those services may be owned by the developing organization or third parties. To provide functionalities based on ...  Read More
Research Article
Robust Face Recognition Under Illumination Changes and Pose Variations
Robust Face Recognition Under Illumination Changes and Pose Variations

Hamid Hassanpour; Omid Kohansal; Sekineh Asadi Amiri

Volume 5, Issue 2 , July 2018, Pages 81-89

http://dx.doi.org/10.22108/jcs.2018.110882.

Abstract
  There are many applications for face recognition. Due to illumination changes, and pose variations of facial images, face recognition is often a challenging and a complicated ...  Read More