透過您的圖書館登入
IP:3.145.143.239
  • 期刊
  • OpenAccess

Comparison of Methods of Treatment of Fuzzy Information for Distribution of Access in Computer Systems

並列摘要


Method of exponentiation modular for information encryption or authentication of client using the currently wide spread cryptographic algorithm RSA was considered in paper for protection of information in the network. Fuzzy system of optimal selection of method of modular exponentiation depending on the values of performance, resistance to time analysis and permissible consumption of memory was modeled. Comparative analysis of the operations of fuzzy inference by Mamdani mechanism and by proposed method was conducted.

延伸閱讀