The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The inherent variation of the same biometric makes it difficult to replace passwords directly with biometrics in a cryptographic scheme. Comparison of the true sets is a key step in biometric template matching or encryption. In FCS (short for fuzzy comparison scheme), an algorithm for biometric template matching is proposed based on fuzzy theory. The proposed method defines two fuzzy sets, measures...
In this paper, we introduce a new type of identity based signature (IBS) scheme that we call fuzzy identity based signature (FIBS). In a FIBS scheme, user's identity are viewed as set of descriptive attributes. A user can use attributes omega to verify a signature signed with the attributes omega' if and only if omega and omega' are within a certain distance of each other as judged by some metric...
One of the most critical operations performed in a P2P system is the lookup of a resource. The main issues to be addressed by lookup algorithms are: (1) support for flexible search criteria (e.g., wildcard or multi-keyword searches), (2) effectiveness - i.e., ability to identify all the resources that match the search criteria, (3) efficiency - i.e. low overhead, (4) robustness with respect to node...
This paper introduces a parallelized variant of the Random Sample Matching (RANSAM) approach, which is a very time and memory efficient enhancement of the common Random Sample Consensus (RANSAC). RANSAM exploits the theory of the birthday attack whose mathematical background is known from cryptography. The RANSAM technique can be applied to various fields of application such as mobile robotics, computer...
This paper studies some fuzzy schemes that can be applied in matching algorithms. A fuzzy matching algorithm is constructed by applying the fuzzy commitment technique on unary numerical representation of object attributes. This enables the scheme to match objects based on their attributes in the order-invariant manner. In this paper, examples are given using sizes and locations of objects as attributes...
In order to effectively evaluate the system security, a quantitative information security evaluation method which combine analytic hierarchy process (AHP) and fuzzy comprehensive evaluation were proposed. Firstly, referring to Common Criteria (CC), we established security evaluation hierarchy model. Then, the analytic hierarchy process (AHP) method was used to calculate the security factors' weights...
Biometric person authentication has been attracting considerable attention in recent years. Conventional biometric person authentication systems, however, simply store each user's template as-is on the system. If registered templates are not properly protected, the risk arises of template leakage to a third party and impersonation using biometric data restored from a template. We propose a technique...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.