期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2020; 26 (2)
Stochastic local search (SLS) algorithms are well known for their ability to efficiently find models of random instances of the Boolean satisfiability......
期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2020; 26 (10)
Based on basic concept of symbolic logic and set theory, this paper focuses on judgments and attempts to provide a new method for the study of logic. ......
期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (3)
Identity-based signcryption schemes based on large integer factorization and discrete logarithm problems were considered to be insecure for the quantu......
期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (3)
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Bold......
期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (3)
Searchable encryption enables the data owner to outsource their data to the cloud server while retaining the search ability. Recently, some researcher......
期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (3)
With the rapid development of high-speed and large-scale complex network, network vulnerability data presents the characteristics of massive, multi-so......
期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (3)
The existence of natural public-key encryption (PKE) schemes satisfying secretly detectable replayable CCA (sd-RCCA) security is left as open. By intr......
期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (5)
Virtual world technologies provide new and immersive space for learning, training, and education. They are enabled by the content creation and content......
期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (3)
Measuring security is a core step for guaranteeing security of network and information systems. Due to massiveness and heterogeneity of measurement da......
期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (9)
The purpose of this paper is to differentiate between natural images (NI) acquired by digital cameras and computer-generated graphics (CG) created by ......
期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (9)
Steganography is a promising technique for covert communications. However, illegal usage of this technique would facilitate cybercrime activities and ......
期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (10)
The development of blockchain technology is very rapidly. As a decentralized distributed technology, the blockchain has become one of the most promisi......
期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2018; 24 (3)
We are facing an era of Online With Offline (OWO) in the smart city - almost everyone is using various online services to connect friends, watch video......