=Paper=
{{Paper
|id=Vol-4042/paper5
|storemode=property
|title=Modeling of a cryptographic network based on application of CET-operations
|pdfUrl=https://ceur-ws.org/Vol-4042/paper5.pdf
|volume=Vol-4042
|authors=Volodymyr Rudnytskyi,Vira Babenko,Nаtaliia Lada,Tetiana Stabetska,Dmytro Pidlasyi,Liubomyr Parkhuts
}}
==Modeling of a cryptographic network based on application of CET-operations==
None