Study on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information
DOI10.3233/IFS-141504zbMath1414.90182OpenAlexW2294384751MaRDI QIDQ5298462
Jing Bian, Ying Wang, Xinguang Peng
Publication date: 15 December 2016
Published in: Journal of Intelligent & Fuzzy Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3233/ifs-141504
information systemmultiple attribute decision making (MADM)security authenticationfuzzy number intuitionistic fuzzy setsfuzzy number intuitionistic fuzzy Hamacher hybrid geometric (FNIFHHG) operatorHamacher geometric aggregation operators
Management decision making, including multiple objectives (90B50) Authentication, digital signatures and secret sharing (94A62) Fuzzy operator theory (47S40)
Related Items (1)
Cites Work
- The GOWA operator based approach to multiattribute decision making using intuitionistic fuzzy sets
- Hesitant fuzzy information aggregation in decision making
- Intuitionistic fuzzy sets
- More on intuitionistic fuzzy sets
- On generalized Hamacher families of triangular operators
- Hesitant fuzzy sets
- A consensus-reaching process under intuitionistic fuzzy preference relations
- The uncertain OWA operator
- Fuzzy sets
- Unnamed Item
- Unnamed Item
This page was built for publication: Study on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information