On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting.
Marina BlantonMehrdad AliasgariPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- fuzzy sets
- fuzzy logic
- access control
- intrusion detection
- fuzzy clustering
- security requirements
- membership functions
- information security
- security issues
- mathematical programming
- design patterns
- security problems
- security systems
- computer security
- fuzzy set theory
- software architecture
- e learning
- security threats
- database
- security measures
- fuzzy numbers
- network security