Fuzzy System of Access Distribution Within a Computer Network

Download Now
Provided by: Journal of Theoretical and Applied Information Technology
Topic: Security
Format: PDF
Continuous growth of volumes of information resources causes strict requirements to crypto protection on the processing speed of entrance data by the computer system. It is natural that for the solution of this task it is necessary to use hardware realization of known algorithms of cryptographic information protection. The method of the information protection transferred in computer networks by the choice of information encryption algorithm on the basis of fuzzy logic is offered in the paper.
Download Now

Find By Topic