Abstract
|
Article Information:
Comparison of Methods of Treatment of Fuzzy Information for Distribution of Access in Computer Systems
A. Shaikhanova, G. Shangytbayeva, B. Ahmetov and R. Beisembekova
Corresponding Author: A. Shaikhanova
Submitted: April 7, 2015
Accepted: April 22, 2015
Published: July 25, 2015 |
Abstract:
|
Method of exponentiation modular for information encryption or authentication of client using the currently wide spread cryptographic algorithm RSA was considered in paper for protection of information in the network. Fuzzy system of optimal selection of method of modular exponentiation depending on the values of performance, resistance to time analysis and permissible consumption of memory was modeled. Comparative analysis of the operations of fuzzy inference by Mamdani mechanism and by proposed method was conducted.
Key words: Fuzzy system, information protection, Mamdani method, modular exponentiation, RSA, time complexity,
|
Abstract
|
PDF
|
HTML |
|
Cite this Reference:
A. Shaikhanova, G. Shangytbayeva, B. Ahmetov and R. Beisembekova, . Comparison of Methods of Treatment of Fuzzy Information for Distribution of Access in Computer Systems. Research Journal of Applied Sciences, Engineering and Technology, (9): 1082-1088.
|
|
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|