نتایج جستجو برای: fuzzy identity

تعداد نتایج: 208357  

Journal: :Security and Communication Networks 2012
Syh-Yuan Tan Zhe Jin Andrew Beng Jin Teoh Bok-Min Goi Swee-Huay Heng

Fuzzy identity-based identification (FIBI) scheme is a recently proposed cryptographic identification protocol. The scheme utilizes user biometric trait as public keys. The authentication is deemed success in the presence of the genuine query biometric together with the valid private key. Because of the fuzziness nature of biometrics, FIBI does not correct the errors on the query biometric with...

2012
Shweta Agrawal Xavier Boyen Vinod Vaikuntanathan Panagiotis Voulgaris Hoeteck Wee

Cryptosystems based on the hardness of lattice problems have recently acquired much importance due to their average-case to worst-case equivalence, their conjectured resistance to quantum cryptanalysis, their ease of implementation and increasing practicality, and, lately, their promising potential as a platform for constructing advanced functionalities. In this work, we construct “Fuzzy” Ident...

2012
A. Vidhya

Nonnegative matrix factorization method is a kind of new matrix rotting method. It is an effective tool for large data processing and analysis. At the same time, NMF has an important performance on in intellectual information processing and pattern recognition. We then aim for increasing an efficiency and accuracy of data clustering and classification based on NMF. NMF method is used to reduce ...

Journal: :Journal of emergency medicine, trauma and acute care 2022

Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One main issues that arise IOMT is how securely data can be transmitted clinical team. In this project, biometric Identity-based encryption was utilized using Fuzzy-IBE (Identity-based encryption) scheme uses face features clinicians create public key. Figure 1 shows testbed setup de...

2002
Salvador Mandujano Rogelio Soto

This paper describes the design and implementation of an authentication system developed for preventing password sharing using fuzzy techniques applied to biometrical data. The c-Means clustering algorithm is implemented to create personal per-keyboard profiles based on the typing patterns of users. These profiles are accessed at logon time to further validate the identity of the user by compar...

2012
Sanaa Kaddoura Islam Elkabani

The dramatic increase of social networking sites forced web users to duplicate their identity on many of them. But, the lack of interoperability and linkage between these social networks allowed users’ information to be disseminated within walled garden data islands. Achieving interoperability will contribute to the creation of rich knowledge base that can be used for querying social networks a...

2015
Yong Liu Jiafen Liu Zhangxi Lin Xubin Luo Jiang Duan

In recent years, pattern password has been widely used for user authentication on smartphones and other mobile devices in addition to the traditional password protection approach. However, pattern password authentication mechanism is incapable of protecting users from losses when a user's login credential information is stolen. We propose an identity verification scheme based on user’s touching...

2011
Nenad Stojanović

In the first part of the study we introduce fuzzy sets that correspond to comparative indicators for measuring sustainable development of tourism. In the second part of the study it is shown, on the base of model created, how one can determine the value of sustainable tourism development in protected areas based on the following established groups of indicators: to assess the economic status, t...

Journal: :Neurocomputing 2013
Amioy Kumar Madasu Hanmandlu H. M. Gupta

The use of fuzzy decision trees is yet to be ascertained for the biometric based personal authentications. This paper therefore presents a fuzzy binary decision tree (FBDT) algorithm for decision making on two classes: genuine and imposter using matching scores computed from the biometric databases. The proposed FBDT makes use of two criteria: fuzzy Gini index and fuzzy entropy for the selectio...

Journal: :Applied sciences 2022

The study analyzes national identity using the International Social Survey Program (ISSP) database for waves of 2003 and 2013. First, Exploratory Factor Analysis (EFA) Multigroup Confirmatory (MGCFA) are used to find dimensions items included in module. Second, civic ethnic analyzed through both a fuzzy clustering analysis an extended apostle model classify citizens’ as following: (1) post nati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید