Spelling suggestions: "subject:"bulanık mantak"" "subject:"bulanık mantal""
1 |
Öğrenci akademik performans değerlendirmesi için yeni bir yaklaşım /Armağan, Hamit. Pehlivan, Serpil. January 2008 (has links) (PDF)
Tez (Yüksek Lisans) - Süleyman Demirel Üniversitesi, Fen Bilimleri Enstitüsü, Matematik Anabilim Dalı, 2008. / Kaynakça var.
|
2 |
Application of Fuzzy Logic in Identity-Based Cryptography / Bulanık Mantığın Kimlik Tabanlı Kriptografide KullanımıOdyurt, Uraz January 2014 (has links)
This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparison. The writing is intended as a self-sufficient resource for readers, containing the schemes and background definitions.
|
Page generated in 0.053 seconds