fuzzy identity
Recently Published Documents


TOTAL DOCUMENTS

55
(FIVE YEARS 8)

H-INDEX

8
(FIVE YEARS 1)

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Adeeb G. Talafha ◽  
Sahar M. Alqaraleh ◽  
A. E. El-Ahmady ◽  
Jehad Al Jaraden

In this paper, we studied the relations between new types of fuzzy retractions, fuzzy foldings, and fuzzy deformation retractions, on fuzzy fundamental groups of the fuzzy Minkowski space M ˜ 4 . These geometrical transformations are used to give a combinatorial characterization of the fundamental groups of fuzzy submanifolds on M ˜ 4 . Then, the fuzzy fundamental groups of the fuzzy geodesics and the limit fuzzy foldings of M ˜ 4 are presented and obtained. Finally, we proved a sequence of theorems concerning the isomorphism between the fuzzy fundamental group and the fuzzy identity group.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Chengtang Cao ◽  
Lin You ◽  
Gengran Hu

In this paper, a construction of a fuzzy identity-based ring signature scheme (LFIBRS) is proposed. Our LFIBRS combines the characteristics of both the fuzzy identity-based signature (FIBS) and the ring signature. On the one hand, a signature issued under an identity ID can be verified by any identity ID ′ that is “close enough” to the identity ID . Since biometric identification is the well-known most popular and reliable identification method, our LFIBRS can be applied in such a situation whenever it is required for official audit or supervision that the signer’s real identity is needed to be authenticated. On the other hand, LFIBRS provides anonymity under the random oracle model. In addition, LFIBRS provides unforgeability under the small integer solution (SIS) lattice hardness assumption which can resist large-scale quantum computer attacks in the future.


Information honesty, a center security issue in solid distributed storage, has gotten a lot of consideration. Information inspecting conventions empower a verifier to productively check the trustworthiness of the re-appropriated information without downloading the information. A key exploration challenge related with existing plans of information reviewing conventions is the intricacy in key administration. In this paper, we look to address the unpredictable key administration challenge in cloud information uprightness checking by presenting fluffy personality based examining, the first in such a methodology, as far as we could possibly know. All the more explicitly, we present the crude of fluffy character based information examining, where a client's personality can be seen as a lot of spellbinding qualities. We formalize the framework model and the security model for this new crude. We at that point present a solid development of fluffy personality based inspecting convention by using biometrics as the fluffy character. The new convention offers the property of mistake resistance, in particular, it ties with private key to one personality which can be utilized to confirm the rightness of a reaction created with another character, if and just if the two characters are adequately close. We demonstrate the security of our convention dependent on the computational Diffie-Hellman suspicion and the discrete logarithm supposition in the particular ID security model. At long last, we build up a model usage of the convention which shows the common sense of the proposition.


2020 ◽  
Vol 9 (32) ◽  
pp. 45-54 ◽  
Author(s):  
Olena Blynova ◽  
Ihor Popovych ◽  
Nataliia Semenova ◽  
Yevheniia Kashyrina ◽  
Olena Ursulenko ◽  
...  

The paper presents empirical research on personality factors of choosing adaptation strategies in a different cultural environment by labor migrants. The study determines three major adaptation strategies: integration, assimilation and marginalization. It establishes that integration and assimilation are means of solving the crisis of social identity. Personal identity acquires features of mature positive identity, when labor migrants integrate into a different cultural environment of a country of their employment. If a migrant chooses the strategy of assimilation, then personal identity has a tendency to approach to diffusive, “fuzzy” identity with indefinite life cycles, a decreased level of self-respect, a lack of internal integrity and uniformity. A marginal status of labor migrants in a country of employment causes an intensification of the crisis of personal identity, when migrants are not satisfied with the situation of employment abroad, but they do not see opportunities for self-realization in Ukraine. Factor analysis made it possible to establish an adaptation structure of labor migrants consisting of five major factors (72.43%).


2019 ◽  
Vol 47 ◽  
pp. 86-93 ◽  
Author(s):  
Yanhua Zhang ◽  
Yupu Hu ◽  
Yong Gan ◽  
Yifeng Yin ◽  
Huiwen Jia

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 160459-160471 ◽  
Author(s):  
Chenbin Zhao ◽  
Li Xu ◽  
Jiguo Li ◽  
Feng Wang ◽  
He Fang

2019 ◽  
Vol 16 (1) ◽  
pp. 72-83 ◽  
Author(s):  
Yannan Li ◽  
Yong Yu ◽  
Geyong Min ◽  
Willy Susilo ◽  
Jianbing Ni ◽  
...  

Author(s):  
Ramya Latha P ◽  
◽  
A. Gangadhara Rao ◽  
J.M.Pra deep ◽  
K.Aru na
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document