نتایج جستجو برای: fuzzy identity

تعداد نتایج: 208357  

Journal: :IACR Cryptology ePrint Archive 2008
Liming Fang Jiandong Wang Yongjun Ren Jinyue Xia Shizhu Bian

(1, 2, 3, 4, 5. College of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, P.R.China) * corresponding author 1. E-mail: [email protected] 2. E-mail: [email protected] 3. E-mail: [email protected] 4. E-mail: [email protected] 5. E-mail: [email protected] Abstract. We use hybrid encryption with Fuzzy Identity-Based Encryption (F...

2011
Inheung Chon

We characterize the fuzzy bi-ideal generated by a fuzzy subset in a semigroup and the fuzzy bi-ideal generated by a fuzzy subset A such that A ⊆ A2 in a semigroup with an identity element. Our work generalizes the characterization of fuzzy bi-ideals by Mo and Wang ([8]).

Background. Brand identity is a dynamic phenomenon with both internal and external aspects and the principles of brand identity have become a topic of the day in the field of brand literature and marketing. Objectives. The present study seeks to explain the conceptual model of factors affecting the brand identity of handball. Methods. The present study was applied in terms of purpose and was ...

Journal: :Computational Statistics & Data Analysis 2003
Hsien-Chung Wu

The method for obtaining the fuzzy estimates of regression parameters with the help of “Resolution Identity” in fuzzy sets theory is proposed. The -level least-squares estimates can be obtained from the usual linear regression model by using the -level real-valued data of the corresponding fuzzy input and output data. The membership functions of fuzzy estimates of regression parameters will be ...

Journal: :I. J. Network Security 2012
Miaomiao Tian Wei Yang Liusheng Huang

Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an identity w′ can be decrypted using a secret key corresponding to the identity w which is close to w′ as measured by some metric. Recently, Yang et al. proposed a constant-size Bio-IBE scheme and proved that it is secure against adaptive chosen-ciphertext a...

2007
Wenyi Zeng Hongxing Li

In this paper, we use the weighted distance between fuzzy numbers to investigate the approximation of arbitrary fuzzy numbers by weighted distance. We then discuss properties of the approximation strategy including continuity, translation invariance, scale invariance and identity and give an application to the generation of fuzzy partitions. 2006 Elsevier Inc. All rights reserved.

2009
Mirko Navara

Interval-valued fuzzy sets are based on the algebra of subintervals of the unit interval [0, 1]. We study valuations as a special type of measures on this algebra. We present a description of all valuations which preserve the standard fuzzy negation and extend the identity on the elements of the form (x, x). Consequences for sublattices are formulated. Keywords— Girard algebra, interval-valued ...

2013
N. Zamani J. Aazami

Let R be a commutative ring with non-zero identity and let M be a non-zero unitary R-module. The concept of fuzzy coprimary submodule as a dual notion of fuzzy primary one will be introduced and some of its properties will be studied. Among other things, the behavior of this concept with respect to fuzzy localization formation and fuzzy quotient will be examined.

2011
R. Saneifard

The concept of (fuzzy) probability density function of fuzzy random variable is proposed in this paper. Due to the "resolution identity", we can construct a closed fuzzy number from a family of closed intervals. Using the same technique, we can construct the (fuzzy) probability density function of fuzzy random variable from the known probability density function. The basic idea of the new metho...

Journal: :JCP 2014
Guoyan Zhang Feng Wang

Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity was viewed as a set of descriptive attributes, and any user with a private key for an identity ID was allowed to decrypt a ciphertext encrypted with an identity ID′ , if and only if the identity ID and ID′were close to each other as measured by the “set overlap” distance metric. After that, Shweta Agrawal...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید