=Paper= {{Paper |id=Vol-4042/paper5 |storemode=property |title=Modeling of a cryptographic network based on application of CET-operations |pdfUrl=https://ceur-ws.org/Vol-4042/paper5.pdf |volume=Vol-4042 |authors=Volodymyr Rudnytskyi,Vira Babenko,Nаtaliia Lada,Tetiana Stabetska,Dmytro Pidlasyi,Liubomyr Parkhuts }} ==Modeling of a cryptographic network based on application of CET-operations== https://ceur-ws.org/Vol-4042/paper5.pdf
None