Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems 2011
DOI: 10.1109/idaacs.2011.6072881
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy evaluation of biometric authentication systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Fuzzy sets are widely used in common engineering problems, e.g., [18,19]. One of the most common membership functions is the triangular membership function defined by the formula:…”
Section: Delphi Methods and Related Workmentioning
confidence: 99%
“…Fuzzy sets are widely used in common engineering problems, e.g., [18,19]. One of the most common membership functions is the triangular membership function defined by the formula:…”
Section: Delphi Methods and Related Workmentioning
confidence: 99%
“…In [30], polynomials T n (x) were defined in a finite body GF (p). In addition, the authors used the defined polynomials to determine the new version of Kocarev's cryptosystem given by use of algorithms (1)- (3).…”
Section: Preliminaries and Related Workmentioning
confidence: 99%
“…Data is downloaded and accessed by almost all electronic devices; however, certain data is only valuable if it is kept secret from everyone except those who are authorized to access it. For this reason, many methods have been created primarily for securing data, such as cryptography, steganography (concealing information in objects; e.g., [16,34]), biometrics (using human anthropometric and behavioral features; e.g., [3,20]), etc.…”
Section: Introductionmentioning
confidence: 99%