Pub. online:6 May 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 2 (2020), pp. 277–298
Abstract
The vulnerable part of communications between user and server is the poor authentication level at the user’s side. For example, in e-banking systems for user authentication are used passwords that can be lost or swindled by a person maliciously impersonating bank.
To increase the security of e-banking system users should be supplied by the elements of public key infrastructure (PKI) but not necessary to the extent of standard requirements which are too complicated for ordinary users.
In this paper, we propose two versions of authenticated key agreement protocol (AKAP) which can be simply realized on the user’s side. AKAP is a collection of cryptographic functions having provable security properties.
It is proved that AKAP1 is secure against active adversary under discrete logarithm assumption when formulated certain conditions hold. AKAP2 provides user’s anonymity against eavesdropping adversary. The partial security of AKAP2 is investigated which relies on the security of asymmetric encryption function.
Journal:Informatica
Volume 31, Issue 3 (2020), pp. 459–479
Abstract
After Morris and Thompson wrote the first paper on password security in 1979, strict password policies have been enforced to make sure users follow the rules on passwords. Many such policies require users to select and use a system-generated password. The objective of this paper is to analyse the effectiveness of strict password management policies with respect to how users remember system-generated passwords of different textual types – plaintext strings, passphrases, and hybrid graphical-textual PsychoPass passwords. In an experiment, participants were assigned a random string, passphrase, and PsychoPass passwords and had to memorize them. Surprisingly, no one has remembered either the random string or the passphrase, whereas only 10% of the participants remembered their PsychoPass password. The policies where administrators let systems assign passwords to users are not appropriate. Although PsychoPass passwords are easier to remember, the recall rate of any system-assigned password is below the acceptable level. The findings of this study explain that system-assigned strong passwords are inappropriate and put unacceptable memory burden on users.
Journal:Informatica
Volume 31, Issue 2 (2020), pp. 331–357
Abstract
In practice, the judgments of decision-makers are often uncertain and thus cannot be represented by accurate values. In this study, the opinions of decision-makers are collected based on grey linguistic variables and the data retains the grey nature throughout all the decision-making process. A grey best-worst method (GBWM) is developed for multiple experts multiple criteria decision-making problems that can employ grey linguistic variables as input data to cover uncertainty. An example is solved by the GBWM and then a sensitivity analysis is done to show the robustness of the method. Comparative analyses verify the validity and advantages of the GBWM.
Journal:Informatica
Volume 32, Issue 1 (2021), pp. 195–216
Abstract
In this paper, the CODAS (Combinative Distance-based Assessment) is utilized to address some MAGDM issues by using picture 2-tuple linguistic numbers (P2TLNs). At first, some essential concepts of picture 2-tuple linguistic sets (P2TLSs) are briefly reviewed. Then, the CODAS method with P2TLNs is constructed and all calculating procedures are simply depicted. Eventually, an empirical application of green supplier selection has been offered to demonstrate this novel method and some comparative analysis between the CODAS method with P2TLNs and several methods are also made to confirm the merits of the developed method.
Journal:Informatica
Volume 31, Issue 3 (2020), pp. 539–560
Abstract
In this paper, we present an effective algorithm for solving the Poisson–Gaussian total variation model. The existence and uniqueness of solution for the mixed Poisson–Gaussian model are proved. Due to the strict convexity of the model, the split-Bregman method is employed to solve the minimization problem. Experimental results show the effectiveness of the proposed method for mixed Poisson–Gaussion noise removal. Comparison with other existing and well-known methods is provided as well.
Journal:Informatica
Volume 31, Issue 3 (2020), pp. 597–620
Abstract
Very recently, side-channel attacks have threatened all traditional cryptographic schemes. Typically, in traditional cryptography, private/secret keys are assumed to be completely hidden to adversaries. However, by side-channel attacks, an adversary may extract fractional content of these private/secret keys. To resist side-channel attacks, leakage-resilient cryptography is a countermeasure. Identity-based public-key system (ID-PKS) is an attractive public-key setting. ID-PKS settings not only discard the certificate requirement, but also remove the construction of the public-key infrastructure. For solving the user revocation problem in ID-PKS settings, revocable ID-PKS (RID-PKS) setting has attracted significant attention. Numerous cryptographic schemes based on RID-PKS settings have been proposed. However, under RID-PKS settings, no leakage-resilient signature or encryption scheme is proposed. In this article, we present the first leakage-resilient revocable ID-based signature (LR-RIBS) scheme with cloud revocation authority (CRA) under the continual leakage model. Also, a new adversary model of LR-RIBS schemes with CRA is defined. Under this new adversary model, security analysis is made to demonstrate that our LR-RIBS scheme with CRA is provably secure in the generic bilinear group (GBG) model. Finally, performance analysis is made to demonstrate that our scheme is suitable for mobile devices.
Journal:Informatica
Volume 31, Issue 2 (2020), pp. 313–330
Abstract
Colouring of graphs is being used in several representations of real world systems like map colouring, traffic signalling, etc. This study introduces the edge colouring of fuzzy graphs. The chromatic index and the strong chromatic index are defined and related properties are investigated. In addition, job oriented web sites, traffic light problems have been presented and solved using the edge colouring of fuzzy graphs more effectively.
Pub. online:27 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 2 (2020), pp. 399–433
Abstract
In this paper, we develop a new flexible method for interval-valued intuitionistic fuzzy decision-making problems with cosine similarity measure. We first introduce the interval-valued intuitionistic fuzzy cosine similarity measure based on the notion of the weighted reduced intuitionistic fuzzy sets. With this cosine similarity measure, we are able to accommodate the attitudinal character of decision-makers in the similarity measuring process. We study some of its essential properties and propose the weighted interval-valued intuitionistic fuzzy cosine similarity measure.
Further, the work uses the idea of GOWA operator to develop the ordered weighted interval-valued intuitionistic fuzzy cosine similarity (OWIVIFCS) measure based on the weighted reduced intuitionistic fuzzy sets. The main advantage of the OWIVIFCS measure is that it provides a parameterized family of cosine similarity measures for interval-valued intuitionistic fuzzy sets and considers different scenarios depending on the attitude of the decision-makers. The measure is demonstrated to satisfy some essential properties, which prepare the ground for applications in different areas. In addition, we define the quasi-ordered weighted interval-valued intuitionistic fuzzy cosine similarity (quasi-OWIVIFCS) measure. It includes a wide range of particular cases such as OWIVIFCS measure, trigonometric-OWIVIFCS measure, exponential-OWIVIFCS measure, radical-OWIVIFCS measure. Finally, the study uses the OWIVIFCS measure to develop a new decision-making method to solve real-world decision problems with interval-valued intuitionistic fuzzy information. A real-life numerical example of contractor selection is also given to demonstrate the effectiveness of the developed approach in solving real-life problems.
Pub. online:26 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 2 (2020), pp. 225–248
Abstract
Today energy demand in the world cannot be met based on the growing population of the countries. Exhaustible resources are not enough to supply this energy requirement. Furthermore, the pollution created by these sources is one of the most important issues for all living things. In this context, clean and sustainable energy alternatives need to be considered. In this study, a novel interval-valued neutrosophic (IVN) ELECTRE I method is conducted to select renewable energy alternative for a municipality. A new division operation and deneutrosophication method for interval-valued neutrosophic sets is proposed. A sensitivity analysis is also implemented to check the validity of the proposed method. The obtained results and the sensitivity analysis demonstrate that the given decision in the application is robust. The results of the proposed method determine that the wind power plant is the best alternative and our proposed method’s decisions are consistent and reliable through the results of comparative and sensitivity analyses.
Pub. online:25 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 2 (2020), pp. 359–397
Abstract
Public-private partnership (PPP) is regarded as an innovative way to the procurement of public projects. Models vary with PPP projects due to their differences. The evaluation criteria are usually complex and the judgments offered by decision makers (DMs) show the characteristics of fuzziness and uncertainty. Considering these cases, this paper first analyses the risk factors for PPP models and then proposes a new method for selecting them in the setting of single-valued neutrosophic hesitant fuzzy environment. To achieve these purposes, two single-valued neutrosophic hesitant fuzzy correlation coefficients are defined to measure evaluated PPP models. Considering the weights of the risk factors and their interactions, two single-valued neutrosophic hesitant fuzzy 2-additive Shapley weighted correlation coefficients are defined. When the 2-additive measure on the risk factor set is not exactly known, several distance measure-based programming models are constructed to determine it. Based on these results, an algorithm for evaluating PPP models with single-valued neutrosophic hesitant fuzzy information is developed. Finally, a practical numerical example is provided to verify the validity and feasibility of the new method.