{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:33Z","timestamp":1773655893642,"version":"3.50.1"},"reference-count":6,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080029","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"879-882","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems"],"prefix":"10.3103","volume":"53","author":[{"given":"E. B.","family":"Aleksandrova","sequence":"first","affiliation":[]},{"given":"A. V.","family":"Yarmak","sequence":"additional","affiliation":[]},{"given":"M. O.","family":"Kalinin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7192_CR1","unstructured":"Kisner, R.A., et al., Cybersecurity through Real-Time Distributed Control Systems, Oak Ridge National Laboratory, Technical Report ORNL\/TM-2010\/30, 2010."},{"key":"7192_CR2","volume-title":"Group signatures, Advances in Cryptology\u2014EUROCRYPT\u201991, Berlin, Heidelberg","author":"D. Chaum","year":"1991","unstructured":"Chaum, D. and van Heyst, E., Group signatures, Advances in Cryptology\u2014EUROCRYPT\u201991, Berlin, Heidelberg: Springer, 1991; Lect. Notes Comput. Sci., 1991, vol. 547, pp. 257\u2013265."},{"key":"7192_CR3","volume-title":"How to leak a secret, Advances in Cryptology\u2014ASIACRYPT 2001, Berlin\u2013Heidelberg","author":"R.L. Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., and Tauman, Y., How to leak a secret, Advances in Cryptology\u2014ASIACRYPT 2001, Berlin\u2013Heidelberg: Springer, 2001; Lect. Notes Comput. Sci., 2001, vol. 2248, pp. 552\u2013565."},{"key":"7192_CR4","volume-title":"Society and group oriented cryptography: A new concept, Advances in Cryptology\u2014CRYPTO\u201987, Berlin\u2013Heidelberg","author":"Y. Desmedt","year":"1987","unstructured":"Desmedt, Y., Society and group oriented cryptography: A new concept, Advances in Cryptology\u2014CRYPTO\u201987, Berlin\u2013Heidelberg: Springer, 1987; Lect. Notes Comput. Sci., 1987, vol. 293, pp. 120\u2013127."},{"key":"7192_CR5","first-page":"1","volume":"71","author":"K. Itakura","year":"1983","unstructured":"Itakura, K., A public-key cryptosystem suitable for digital multisignatures, NEC Res. Dev., 1983, vol. 71, pp. 1\u20138.","journal-title":"NEC Res. Dev."},{"key":"7192_CR6","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., et al., Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing, Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 276\u2013285.","DOI":"10.1145\/1315245.1315280"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080029.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080029","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080029.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:57Z","timestamp":1773612357000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080029"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":6,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7192"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080029","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"1 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}