Data Encryption Technique Using Random Number Generator
暂无分享,去创建一个
[1] I. Turksen. Interval valued fuzzy sets based on normal forms , 1986 .
[2] Jerry M. Mendel,et al. Interval type-2 fuzzy logic systems , 2000, Ninth IEEE International Conference on Fuzzy Systems. FUZZ- IEEE 2000 (Cat. No.00CH37063).
[3] M. Braine. On the Relation Between the Natural Logic of Reasoning and Standard Logic. , 1978 .
[4] Alexey Stakhov,et al. The golden section in the measurement theory , 1989 .
[5] Janusz Kacprzyk,et al. LINGUISTIC SUMMARIES OF DATA USING FUZZY LOGIC , 2001 .
[6] Lotfi A. Zadeh,et al. Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..
[7] Tzong-Mou Wu. One-to-one mapping matrix , 2005, Appl. Math. Comput..
[8] Jerry M. Mendel,et al. Interval Type-2 Fuzzy Logic Systems Made Simple , 2006, IEEE Transactions on Fuzzy Systems.
[9] Jerry M. Mendel. The perceptual computer: an architecture for computing with words , 2001, 10th IEEE International Conference on Fuzzy Systems. (Cat. No.01CH37297).
[10] Masoud Nikravesh. Soft computing for reservoir characterization and management , 2005, 2005 IEEE International Conference on Granular Computing.
[11] Jerry M. Mendel,et al. Type-2 fuzzy sets and systems: an overview , 2007, IEEE Computational Intelligence Magazine.
[12] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[13] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[14] Lotfi A. Zadeh,et al. Fuzzy logic = computing with words , 1996, IEEE Trans. Fuzzy Syst..
[15] Didier Dubois,et al. Probability-Possibility Transformations, Triangular Fuzzy Sets, and Probabilistic Inequalities , 2004, Reliab. Comput..
[16] Alexey Stakhov,et al. The Golden Section and Modern Harmony Mathematics , 1998 .
[17] A. Vinaya Babu,et al. A generalized scheme for data encryption technique using a randomized matrix key , 2007 .
[18] Jerry M. Mendel,et al. Computing with words and its relationships with fuzzistics , 2007, Inf. Sci..
[19] Alexey Stakhov,et al. The “golden” matrices and a new kind of cryptography , 2007 .
[20] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[21] Aaron D. Wyner,et al. Communication Theory of Secrecy SystemsThe material in this paper appeared originally in a confidential report ¿A Mathematical Theory of Cryptography¿ dated Sept. 1, 1945, which has now been declassified. , 1993 .
[22] I. Turksen. Type 2 representation and reasoning for CWW , 2002 .
[23] Jerry M. Mendel,et al. Aggregation Using the Linguistic Weighted Average and Interval Type-2 Fuzzy Sets , 2007, IEEE Transactions on Fuzzy Systems.
[24] Nick Chater,et al. Fast, frugal, and rational: How rational norms explain behavior , 2003 .
[25] Lotfi A. Zadeh,et al. Toward a generalized theory of uncertainty (GTU)--an outline , 2005, Inf. Sci..