{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:57:26Z","timestamp":1773615446335,"version":"3.50.1"},"reference-count":8,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.3103\/s0146411617080181","type":"journal-article","created":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T06:51:40Z","timestamp":1519887100000},"page":"965-971","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A method of providing the integrity of information in the group of robotic engineering complexes based on crypt-code constructions"],"prefix":"10.3103","volume":"51","author":[{"given":"D. V.","family":"Samoylenko","sequence":"first","affiliation":[]},{"given":"M. A.","family":"Eremeev","sequence":"additional","affiliation":[]},{"given":"O. A.","family":"Finko","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2018,3,1]]},"reference":[{"key":"6640_CR1","unstructured":"Unmanned Aircraft Systems (UAS) Roadmap, 2005\u20132030. https:\/\/fas.org\/irp\/program\/collect\/uav_roadmap2005.pdf."},{"key":"6640_CR2","volume-title":"IEEE Information Theory Workshop","author":"J. Harshan","year":"2015","unstructured":"Harshan, J. and Oggier, F., On algebraic manipulation detection codes from linear codes and their application to storage systems, IEEE Information Theory Workshop, 2015."},{"key":"6640_CR3","volume-title":"Nelineinyi Mir","author":"D.V. Samoylenko","year":"2013","unstructured":"Samoylenko, D.V. and Finko, O.A., Simulation of data transmission in secure unidirectional communication systems based on polynomial classes of residues, Nelineinyi Mir, 2013, no. 9."},{"key":"6640_CR4","volume-title":"Naukoemkie Tekhnol. Kosm. Issled. Zemli","author":"D.V. Samoylenko","year":"2016","unstructured":"Samoylenko, D.V. and Finko, O.A., Interference-free data transmission in radio channels of robotic complexes based on polynomial classes of residues, Naukoemkie Tekhnol. Kosm. Issled. Zemli, 2016, no. 3."},{"key":"6640_CR5","unstructured":"Rekomendatsii po standartizatsii R 50.1.053-2005. Osnovnye terminy i opredeleniya v oblasti tekhnicheskoi zashchity informatsii (Recommendations on Standardization R 50.1.053-2005: Basic Terms and Definitions in the Field of Technical Protection of Information), Moscow: Standartinform, 2006."},{"key":"6640_CR6","volume-title":"Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial","author":"H.C.A. Van Tilborg","year":"1999","unstructured":"Van Tilborg, H.C.A., Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial, Springer, 1999."},{"key":"6640_CR7","volume-title":"IPTPS'01","author":"H. Weatherspoon","year":"2002","unstructured":"Weatherspoon, H. and Kubiatowicz, J., Erasure coding vs. replication: A quantitative comparison, IPTPS'01, 2002."},{"key":"6640_CR8","volume-title":"Kodirovanie v radioelektronike","author":"E.M. Gabidulin","year":"1986","unstructured":"Gabidulin, E.M. and Afanas\u2019ev, V.B., Kodirovanie v radioelektronike (Coding in Radio Electronics), Moscow: Radio i Svyaz\u2019, 1986."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411617080181","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411617080181.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411617080181.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:00Z","timestamp":1773612000000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411617080181"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":8,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["6640"],"URL":"https:\/\/doi.org\/10.3103\/s0146411617080181","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]},"assertion":[{"value":"10 February 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2018","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}