نتایج جستجو برای: secure sets

تعداد نتایج: 266654  

Journal: :Fuzzy Sets and Systems 2002
Chang-Chun Lin An-Pin Chen

Li and Yu (Fuzzy Sets and Systems 101 (1999) 109) argued that the model of Yang et al. for fuzzy programming (Fuzzy Sets and Systems 41 (1991) 39) is correct only for a speci2c type of piecewise linear membership function and proposed their model for other type of membership functions. This study generalizes the model of Yang et al. A numerical example indicates that the model of Li and Yu is i...

2009
Rudolf Seising

When 60 years ago Shannon established “A Mathematical Theory of Communication” nobody could know the consequences for science and technology in the second half of the century. Shannon published his article in two parts in the July and October 1948 editions of the Bell System Technical Journal. However, it is very probable that this article wouldn’t have become famous without the help of Weaver,...

Journal: :Mathematical and Computer Modelling 2009
A. Thavaneswaran S. S. Appadoo A. Paseka

Carlsson and Fuller [C. Carlsson, R. Fuller, On possibilistic mean value and variance of fuzzy numbers, Fuzzy Sets and Systems 122 (2001) 315–326] have introduced possibilisticmean, variance and covariance of fuzzy numbers and Fuller andMajlender [R. Fuller, P. Majlender, On weighted possibilistic mean and variance of fuzzy numbers, Fuzzy Sets and Systems 136 (2003) 363–374] have introduced the...

Journal: :Fuzzy Sets and Systems 2003
Glad Deschrijver Etienne E. Kerre

Fuzzy relations are able to model vagueness, in the sense that they provide the degree to which two objects are related to each other. However, they cannot model uncertainty: there is no means to attribute reliability information to the membership degrees. Intuitionistic fuzzy sets, as de1ned by Atanassov (Instuitionistic Fuzzy Sets, Physica-Verlag, Heidelberg, New York, 1999), give us a way to...

2013
José Portelo Alberto Abad Bhiksha Raj Isabel Trancoso

Remote speaker verification services typically rely on the system to have access to the users recordings, or features derived from them, and also a model of the users voice. This conventional scheme raises several privacy concerns. In this work, we address this privacy problem in the context of a speaker verification system using a factor analysis based front-end extractor, the so-called i-vect...

2014

In classification, discrimination is a type of treatment that includes denying the membership in one group opportunities that are available in another group. Discrimination based on age, religion, gender, caste, disability, employment, language, race and nationality. In this technique, direct and indirect discrimination is prevented using rule protection and rule generalization methods and BIRC...

Journal: :African J. of Inf. & Commun. Technology 2006
Yick Hon Joseph So Jidong Wang Deddy Chandra

Mobile IP allows a mobile node to roam into a foreign IP network without losing its connection with its peer. Mobile IPv6 uses Route Optimization to improve the routing performance by avoiding the triangle routing problem and adopting Return Routability as a secure process for binding update. Host Identity Protocol (HIP) is an experimental security protocol which provides mobility management an...

2014
Taylor Daniels Daniel Smith-Tone

Multivariate Public Key Cryptography (MPKC) has been put forth as a possible post-quantum family of cryptographic schemes. These schemes lack provable security in the reduction theoretic sense, and so their security against yet undiscovered attacks remains uncertain. The effectiveness of differential attacks on various field-based systems has prompted the investigation of differential propertie...

Journal: :Lecture Notes in Computer Science 2022

In the classical world, existence of commitments is equivalent to one-way functions. quantum setting, on other hand, are not known imply functions, but all constructions use at least Are functions really necessary for in world? this work, we show that non-interactive (for messages) with computational hiding and statistical binding exist if pseudorandom states exist. Pseudorandom sets efficientl...

2014
Benny Pinkas Thomas Schneider Michael Zohner

Private set intersection (PSI) allows two parties to compute the intersection of their sets without revealing any information about items that are not in the intersection. It is one of the best studied applications of secure computation and many PSI protocols have been proposed. However, the variety of existing PSI protocols makes it difficult to identify the solution that performs best in a re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید