{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T18:37:25Z","timestamp":1778611045357,"version":"3.51.4"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1998,11,1]],"date-time":"1998-11-01T00:00:00Z","timestamp":909878400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1998,11,1]],"date-time":"1998-11-01T00:00:00Z","timestamp":909878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1998,11]]},"DOI":"10.1023\/a:1026421315292","type":"journal-article","created":{"date-parts":[[2003,11,6]],"date-time":"2003-11-06T11:45:40Z","timestamp":1068119140000},"page":"111-124","source":"Crossref","is-referenced-by-count":94,"title":["How to Build Robust Shared Control Systems"],"prefix":"10.1007","volume":"15","author":[{"given":"Ross","family":"Anderson","sequence":"first","affiliation":[]},{"given":"Cunsheng","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Tor","family":"Helleseth","sequence":"additional","affiliation":[]},{"given":"Torleiv","family":"Klove","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"181759_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/188280.188291","volume":"37","author":"R.J. Anderson","year":"1994","unstructured":"R.J. Anderson, Why Cryptosystems Fail, Communications of the ACMVol 37, No.11 (1994) pp. 32-40.","journal-title":"Communications of the ACM"},{"key":"181759_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781316529836","volume-title":"Designs and Their Codes","author":"E.F. Assmus Jr","year":"1992","unstructured":"E.F. Assmus, Jr. and J.D. Key, Designs and Their Codes, Cambridge University Press, Cambridge (1992)."},{"key":"181759_CR3","doi-asserted-by":"crossref","unstructured":"G.R. Blakley, Safeguarding cryptographic keys, Proceedings of NCC AFIPS (1979) pp. 313-317.","DOI":"10.1109\/MARK.1979.8817296"},{"key":"181759_CR4","first-page":"181","volume":"18","author":"A. Bonisoli","year":"1983","unstructured":"A. Bonisoli, Every equidistance linear code is a sequence of dual Hamming codes, Ars CombinatoriaVol. 18 (1983) pp. 181-186.","journal-title":"Ars Combinatoria"},{"key":"181759_CR5","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1112\/blms\/18.2.97","volume":"18","author":"R. Calderbank","year":"1986","unstructured":"R. Calderbank, W.M. Kantor, The geometry of two-weight codes, Bulletin of the London Mathematical Society, Vol. 18 (1986) pp. 97-122.","journal-title":"Bulletin of the London Mathematical Society"},{"key":"181759_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology: Proceedings of Crypto 89","author":"Y. Desmedt","year":"1990","unstructured":"Y. Desmedt, Y. Frankel, Threshold cryptosystems, Advances in Cryptology: Proceedings of Crypto 89, Lecture Notes in Computer Science, Springer-Verlag, New York, 435 (1990) pp. 307-315."},{"key":"181759_CR7","first-page":"644","volume":"IT-29","author":"E.D. Karnin","year":"1983","unstructured":"E.D. Karnin, J.W. Green, M. Hellman, On secret sharing systems, IEEE Transactions on Information Theory, Vol. IT-29 (1983) pp. 644-654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"181759_CR8","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1978","unstructured":"F.J. MacWilliams, N.J.A. Sloane, The Theory of Error-Correcting CodesNorth-Holland, Amsterdam (1978)."},{"key":"181759_CR9","unstructured":"J.L. Massey, Minimal codewords and secret sharing, Proceedings of the 6th Joint Swedish-RussianWorkshop on Information Theory, M\u00f6lle, Sweden, August 22-27, 1993 pp. 276-279."},{"key":"181759_CR10","first-page":"33","volume-title":"Codes and Ciphers: Cryptography and Coding IV","author":"J.L. Massey","year":"1995","unstructured":"J.L. Massey, Some applications of coding theory in cryptography, Codes and Ciphers: Cryptography and Coding IV(Ed. P.G. Farrell), IMA, England (1995) pp. 33-47."},{"key":"181759_CR11","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1145\/358746.358762","volume":"24","author":"R.J. McEliece","year":"1981","unstructured":"R.J. McEliece, D.V. Sarwate, On sharing secrets and Reed-Solomon codes, Communications of the ACMVol. 24 (1981) pp. 583-584.","journal-title":"Communications of the ACM"},{"key":"181759_CR12","doi-asserted-by":"crossref","unstructured":"M.K. Reiter, M.K. Franklin, J.B. Lacy, R.A. Wright, The Omega Key Management Service, Proceedings of 3rd ACM Conference on Computer and Communications Security, ACM Press (1997) pp. 38-47.","DOI":"10.1145\/238168.238184"},{"key":"181759_CR13","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, How to share a secret, Communications of the ACM, Vol. 22 (1979) pp. 612-613.","journal-title":"Communications of the ACM"},{"key":"181759_CR14","unstructured":"VISA Security Module Operations Manual, VISA, 1986"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1026421315292.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1026421315292\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1026421315292.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:45:51Z","timestamp":1753760751000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1026421315292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,11]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1998,11]]}},"alternative-id":["181759"],"URL":"https:\/\/doi.org\/10.1023\/a:1026421315292","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998,11]]}}}