Fuzzy logic and neurofuzzy applications explained
Fuzzy logic and neurofuzzy applications explained
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices
Proceedings of the 11th USENIX Security Symposium
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Trapezoidal approximations of fuzzy numbers---revisited
Fuzzy Sets and Systems
Hierarchical Threshold Secret Sharing
Journal of Cryptology
On Unconditionally Secure Distributed Oblivious Transfer
Journal of Cryptology
Mamdani FLC with Various Implications
SYNASC '09 Proceedings of the 2009 11th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing
Hi-index | 0.00 |
Fuzzy logic was introduced as a mathematical treatment for vague information, being very important in cryptography mostly because its appliance in authentication process. We propose an identity authentication and a key agreement protocol based on fuzzy logic which is recommended for group communication. The users authenticate themselves to a server, and not to each other. The common key is generated using biometric data. The protocol has low complexity due to the fact that the authentication and the key agreement are done simultaneously.