Function S-rough sets and security-authentication of hiding law.
Kaiquan ShiJianLi ZhaoPublished in: Sci. China Ser. F Inf. Sci. (2008)
Keyphrases
- rough sets
- rough set theory
- security mechanisms
- decision rules
- fuzzy sets
- security requirements
- user authentication
- granular computing
- information security
- rough sets theory
- inductive machine learning
- rough set model
- information entropy
- attribute reduction
- tool for data mining
- authentication protocol
- continuous valued attributes
- decision table
- soft computing
- fuzzy logic
- pattern recognition
- data mining
- dominance relation
- rule induction
- data analysis
- real world
- smart card
- image processing
- decision making
- computer vision