Login / Signup
On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting.
Marina Blanton
Mehrdad Aliasgari
Published in:
SECRYPT (2011)
Keyphrases
</>
security issues
fuzzy sets
information security
fuzzy set theory
access control
fuzzy logic
membership functions
fuzzy numbers
security protocols
security systems
security problems
intrusion detection
fuzzy rules
fuzzy clustering
fuzzy controller
security analysis