Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)
1. Vol. 5, No. 2, 2018
Volume 5, Issue 2 , Summer and Autumn 2018, Pages 59-89
Abstract
Vol. 5, No. 2, 2018 Read More2. Security Analysis of Two Lightweight Certificateless Signature Schemes
Volume 5, Issue 2 , Summer and Autumn 2018, Pages 59-65
Abstract
Certificateless cryptography can be considered as an intermediate solution to overcome the issues in traditional public key infrastructure (PKI) and identity-based public key cryptography ... Read More3. An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences
Volume 5, Issue 2 , Summer and Autumn 2018, Pages 67-79
Abstract
Service-based application (SBA) is composed of software services, and those services may be owned by the developing organization or third parties. To provide functionalities based on ... Read More4. Robust Face Recognition Under Illumination Changes and Pose Variations
Volume 5, Issue 2 , Summer and Autumn 2018, Pages 81-89