An Integrated Soft Computing Approach to a Multi-biometric Security Model.
Prem Sewak SudhishPublished in: CoRR (2018)
Keyphrases
- soft computing
- security model
- fuzzy logic
- computational intelligence
- access control
- intelligent systems
- security analysis
- public key
- soft computing methods
- rough sets
- security requirements
- evolutionary computation
- artificial neural networks
- learning paradigms
- neural network
- data mining
- hybrid intelligent systems
- pattern recognition
- fuzzy sets
- authentication and key agreement
- real time
- computer networks
- genetic programming