Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric. Aim of this paper is to show other models and algorithms of secure fuzzy authentication, which can be performed using the rank metric. A few schemes are presented which can then be applied in different scenarios and applications.

Fuzzy authentication using rank distance / Neri, A.; Rosenthal, J.; Schipani, D.. - 447:(2018), pp. 97-108. ( 2nd Workshop on Communication Security, WCS 2017 fra 2017) [10.1007/978-3-319-59265-7_7].

Fuzzy authentication using rank distance

Neri A.;
2018

Abstract

Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric. Aim of this paper is to show other models and algorithms of secure fuzzy authentication, which can be performed using the rank metric. A few schemes are presented which can then be applied in different scenarios and applications.
2018
9783319592640
9783319592657
Fuzzy authentication using rank distance / Neri, A.; Rosenthal, J.; Schipani, D.. - 447:(2018), pp. 97-108. ( 2nd Workshop on Communication Security, WCS 2017 fra 2017) [10.1007/978-3-319-59265-7_7].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11588/964016
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 0
social impact