筛选条件 共查询到29条结果
排序方式
Improving WalkSAT for Random 3-SAT Problems

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2020; 26 (2)

Stochastic local search (SLS) algorithms are well known for their ability to efficiently find models of random instances of the Boolean satisfiability......

Graphic Deduction Based on Set

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2020; 26 (10)

Based on basic concept of symbolic logic and set theory, this paper focuses on judgments and attempts to provide a new method for the study of logic. ......

An Identity-Based Signcryption on Lattice without Trapdoor

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (3)

Identity-based signcryption schemes based on large integer factorization and discrete logarithm problems were considered to be insecure for the quantu......

JIF:0.91

CCA-Secure Deterministic Identity-Based Encryption Scheme

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (3)

Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Bold......

JIF:0.91

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (3)

Searchable encryption enables the data owner to outsource their data to the cloud server while retaining the search ability. Recently, some researcher......

JIF:0.91

Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (3)

With the rapid development of high-speed and large-scale complex network, network vulnerability data presents the characteristics of massive, multi-so......

JIF:0.91

Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (3)

The existence of natural public-key encryption (PKE) schemes satisfying secretly detectable replayable CCA (sd-RCCA) security is left as open. By intr......

JIF:0.91

Efficient Peer-to-Peer Content Sharing for Learning in Virtual Worlds

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (5)

Virtual world technologies provide new and immersive space for learning, training, and education. They are enabled by the content creation and content......

JIF:0.91

Combination Model of Heterogeneous Data for Security Measurement

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (3)

Measuring security is a core step for guaranteeing security of network and information systems. Due to massiveness and heterogeneity of measurement da......

JIF:0.91

Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (9)

The purpose of this paper is to differentiate between natural images (NI) acquired by digital cameras and computer-generated graphics (CG) created by ......

JIF:0.91

Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (9)

Steganography is a promising technique for covert communications. However, illegal usage of this technique would facilitate cybercrime activities and ......

JIF:0.91

Research on Fair Trading Mechanism of Surplus Power Based on Blockchain

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019; 25 (10)

The development of blockchain technology is very rapidly. As a decentralized distributed technology, the blockchain has become one of the most promisi......

JIF:0.91

Linking User Online Behavior across Domains with Internet Traffic

期刊: JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2018; 24 (3)

We are facing an era of Online With Offline (OWO) in the smart city - almost everyone is using various online services to connect friends, watch video......

JIF:0.91

共29条页码: 1/2页15条/页