Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology

    Abstract
2015(Vol.10, Issue:9)
Article Information:

Comparison of Methods of Treatment of Fuzzy Information for Distribution of Access in Computer Systems

A. Shaikhanova, G. Shangytbayeva, B. Ahmetov and R. Beisembekova
Corresponding Author:  A. Shaikhanova 
Submitted: April ‎7, ‎2015
Accepted: April ‎22, ‎2015
Published: July 25, 2015
Abstract:
Method of exponentiation modular for information encryption or authentication of client using the currently wide spread cryptographic algorithm RSA was considered in paper for protection of information in the network. Fuzzy system of optimal selection of method of modular exponentiation depending on the values of performance, resistance to time analysis and permissible consumption of memory was modeled. Comparative analysis of the operations of fuzzy inference by Mamdani mechanism and by proposed method was conducted.

Key words:  Fuzzy system, information protection, Mamdani method, modular exponentiation, RSA, time complexity,
Abstract PDF HTML
Cite this Reference:
A. Shaikhanova, G. Shangytbayeva, B. Ahmetov and R. Beisembekova, . Comparison of Methods of Treatment of Fuzzy Information for Distribution of Access in Computer Systems. Research Journal of Applied Sciences, Engineering and Technology, (9): 1082-1088.
ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved