{"version.version":"0.0.7","version.cm_url":"https://github.com/ceurws/ceur-spt","spt.html_url":"/Vol-4042/paper5.html","spt.description":null,"spt.id":"Vol-4042/paper5","spt.wikidataid":null,"spt.title":"Modeling of a cryptographic network based on application of CET-operations","spt.pdfUrl":"https://ceur-ws.org/Vol-4042/paper5.pdf","spt.volume":{"number":4042,"acronym":"CSDP 2025","wikidataid":null,"title":"Proceedings of the Cyber Security and Data Protection","description":null,"url":null,"date":"2025-09-25","dblp":null,"k10plus":null,"urn":null},"spt.session":null,"cvb.id":"Vol-4042/paper5","cvb.title":"Modeling of a cryptographic network based on application of CET-operations","cvb.type":null,"cvb.position":null,"cvb.pagesFrom":null,"cvb.pagesTo":null,"cvb.authors":"Volodymyr Rudnytskyi,Vira Babenko,Nаtaliia Lada,Tetiana Stabetska,Dmytro Pidlasyi,Liubomyr Parkhuts","cvb.vol_number":"4042","cvb.pdf_name":"paper5.pdf","cvb.pages":"64-79","cvb.fail":null}