نتایج جستجو برای: fuzzy identity

تعداد نتایج: 208357  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه 1377

fuzzy logic has been developed over the past three decades into a widely applied techinque in classification and control engineering. today fuzzy logic control is one of the most important applications of fuzzy set theory and specially fuzzy logic. there are two general approachs for using of fuzzy control, software and hardware. integrated circuits as a solution for hardware realization are us...

Journal: :Security and Communication Networks 2013
Syh-Yuan Tan Zhe Jin Andrew Beng Jin Teoh

Recently, a few biometric identity-based encryption (BIO-IBE) schemes have been proposed. BIO-IBE leverages both fuzzy extractor and Lagrange polynomial to extract biometric feature as a user public key and as a preventive measure of collusion attack, respectively. In this paper, we reveal that BIO-IBE is not realistic whereby a query of fresh biometrics is needed for each encryption process. M...

2009
V. S. Meenakshi G. Padmavathi

Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person’s biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biom...

Journal: :Symmetry 2017
Kim-Phung Truong Ming-Hung Shu Thanh-Lam Nguyen Bi-Min Hsu

The inevitability of measurement errors and/or humans of subjectivity in data collection processes make accumulated data imprecise, and are thus called fuzzy data. To adapt to this fuzzy domain in a manufacturing process, a traditional u control chart for monitoring the average number of nonconformities per unit is required to extend. In this paper, we first generalize the u chart, named fuzzy ...

In the framework of fuzzy algebras with fuzzy equalities and acomplete lattice as a structure of membership values, we investigate fuzzyequational classes. They consist of special fuzzy algebras fullling the samefuzzy identities, dened with respect to fuzzy equalities. We introduce basicnotions and the corresponding operators of universal algebra: construction offuzzy subalgebras, homomorphisms...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده ریاضی و کامپیوتر 1389

in this thesis, at first we investigate the bounded inverse theorem on fuzzy normed linear spaces and study the set of all compact operators on these spaces. then we introduce the notions of fuzzy boundedness and investigate a new norm operators and the relationship between continuity and boundedness. and, we show that the space of all fuzzy bounded operators is complete. finally, we define...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور استان مازندران - دانشکده ریاضی 1390

abstract this thesis includes five chapter : the first chapter assign to establish fuzzy mathematics requirement and introduction of liner programming in thesis. the second chapter we introduce a multilevel linear programming problems. the third chapter we proposed interactive fuzzy programming which consists of two phases , the study termination conditions of algorithm we show a satisfac...

Journal: :Journal of experimental child psychology 1998
C J Brainerd V F Reyna

Fuzzy-trace theory's concepts of identity judgment, nonidentity judgment, and similarity judgment provide a unified account of the false-memory phenomena that have been most commonly studied in children: false-recognition effects and misinformation effects. False-recognition effects (elevated false-alarm rates for unpresented distractors that preserve the meanings of presented targets) are due ...

Journal: :Informatica, Lith. Acad. Sci. 2012
Xu An Wang Xiaoyuan Yang Minqing Zhang Yong Yu

Fuzzy identity based encryption (FIBE), proposed by Sahai and Waters, is a new kind of identity based encryption. It allows users with identity w can decrypt ciphertext for w′ if and only if w is close enough to w′. Recently, Ren et al. proposed a new FIBE scheme and claimed it is fully CCA2 secure in the standard model with a tight reduction. However, in this paper we will show that their sche...

Journal: :I. J. Network Security 2004
Andrew Burnett Fergus Byrne Tom Dowling Adam Duffy

We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in a legal dispute over whether a contract had been signed or not by a user. A biometric reading provided by the alleged signer would be enough to verify the signature. We make use of Fuzzy extractors [7] to generate a key string from a biometric measurem...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید