{"labels":{"en":"Modeling of a cryptographic network based on application of CET-operations"},"descriptions":{"en":"scientific paper published in CEUR-WS Volume 4042"},"claims":{"P31":"Q13442814","P1433":null,"P1476":{"text":"Modeling of a cryptographic network based on application of CET-operations","language":"en"},"P407":"Q1860","P953":"https://ceur-ws.org/Vol-4042/paper5.pdf","P50":[],"P2093":[{"value":"Volodymyr Rudnytskyi","qualifiers":{"P1545":"1"}},{"value":"Vira Babenko","qualifiers":{"P1545":"2"}},{"value":"Nаtaliia Lada","qualifiers":{"P1545":"3"}},{"value":"Tetiana Stabetska","qualifiers":{"P1545":"4"}},{"value":"Dmytro Pidlasyi","qualifiers":{"P1545":"5"}},{"value":"Liubomyr Parkhuts","qualifiers":{"P1545":"6"}}]}}