2019
DOI: 10.1504/ijsn.2019.10021700
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic key password authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Petrovsky [25] demonstrated that a search for a fuzzy cluster in a feature Hilbert space, as we suggested above, results into the following fuzzy clustering problem (4) where H is the feature space containing vectors representing authorization attempts; c is the center of the fuzzy cluster in the feature space corresponding to legitimate user authorization attempts; D is the function of the membership degree vector; N is the number of legitimate authorization attempts used for training; d i ∈[0,1] is the membership degree of image f(x i ) with respect to the fuzzy cluster in the feature space, and, accordingly, the typicalness degree of object xi; m is the fuzziness degree, and eta (η) is the distance from the cluster center, where the typicalness degree of the object is considered to be 0.5.…”
Section: Fuzzy Clustering In Feature Spacementioning
confidence: 97%
See 2 more Smart Citations
“…Petrovsky [25] demonstrated that a search for a fuzzy cluster in a feature Hilbert space, as we suggested above, results into the following fuzzy clustering problem (4) where H is the feature space containing vectors representing authorization attempts; c is the center of the fuzzy cluster in the feature space corresponding to legitimate user authorization attempts; D is the function of the membership degree vector; N is the number of legitimate authorization attempts used for training; d i ∈[0,1] is the membership degree of image f(x i ) with respect to the fuzzy cluster in the feature space, and, accordingly, the typicalness degree of object xi; m is the fuzziness degree, and eta (η) is the distance from the cluster center, where the typicalness degree of the object is considered to be 0.5.…”
Section: Fuzzy Clustering In Feature Spacementioning
confidence: 97%
“…The user authentication problem can be tackled in many ways. In modern information systems, passwords remain the most common digital authentication method [1][2][3][4]. Passwords are typically a string of characters used to confirm a user's identity during the authentication process.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation