Security Analysis of Two Lightweight Certificateless Signature Schemes
2. Security Analysis of Two Lightweight Certificateless Signature Schemes

Nasrollah Pakniat

Volume 5, Issue 2 , Summer and Autumn 2018, Pages 59-65

http://dx.doi.org/10.22108/jcs.2019.110889.

Abstract
  Certificateless cryptography can be considered as an intermediate solution to overcome the issues in traditional public key infrastructure (PKI) and identity-based public key cryptography ...  Read More
An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences
3. An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences

Yousef Rastegari

Volume 5, Issue 2 , Summer and Autumn 2018, Pages 67-79

http://dx.doi.org/10.22108/jcs.2018.106853.0

Abstract
  Service-based application (SBA) is composed of software services, and those services may be owned by the developing organization or third parties. To provide functionalities based on ...  Read More
Robust Face Recognition Under Illumination Changes and Pose Variations
4. Robust Face Recognition Under Illumination Changes and Pose Variations

Hamid Hassanpour; Omid Kohansal; Sekineh Asadi Amiri

Volume 5, Issue 2 , Summer and Autumn 2018, Pages 81-89

http://dx.doi.org/10.22108/jcs.2018.110882.

Abstract
  There are many applications for face recognition. Due to illumination changes, and pose variations of facial images, face recognition is often a challenging and a complicated ...  Read More