{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:05:33Z","timestamp":1773655533599,"version":"3.50.1"},"reference-count":29,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.3103\/s0146411620080039","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T06:05:04Z","timestamp":1613628304000},"page":"888-895","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Lattice-Based Ring Signature with Linking-Based Revocation for Industrial Internet of Things"],"prefix":"10.3103","volume":"54","author":[{"given":"E. B.","family":"Aleksandrova","sequence":"first","affiliation":[]},{"given":"I. Sh.","family":"Rekhviashvili","sequence":"additional","affiliation":[]},{"given":"A. V.","family":"Yarmak","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"7308_CR1","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.3103\/S0146411618080369","volume":"52","author":"A.D. Dakhnovich","year":"2018","unstructured":"Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071\u20131075.","journal-title":"Autom. Control Comput. Sci."},{"key":"7308_CR2","doi-asserted-by":"publisher","unstructured":"Pavlenko, E., Zegzhda, D., and Styrkina, A., Estimating the sustainability of cyber-physical systems based on spectral graph theory, 2019 IEEE International Black Sea Conference on Communications and Networking, 2019. \n               https:\/\/doi.org\/10.1109\/BlackSeaCom.2019.8812826","DOI":"10.1109\/BlackSeaCom.2019.8812826"},{"key":"7308_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390814","volume-title":"Sustainability of cyber-physical systems in the context of targeted destructive influences","author":"E. Pavlenko","year":"2018","unstructured":"Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, 2018, pp. 830\u2013834."},{"key":"7308_CR4","doi-asserted-by":"publisher","first-page":"899","DOI":"10.3103\/S0146411617080119","volume":"51","author":"M.O. Kalinin","year":"2017","unstructured":"Kalinin, M.O. and Minin, A.A., Security evaluation of a wireless ad-hoc network with dynamic topology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 899\u2013901.","journal-title":"Autom. Control Comput. Sci."},{"key":"7308_CR5","doi-asserted-by":"publisher","first-page":"954","DOI":"10.3103\/S0146411618080199","volume":"52","author":"T.D. Ovasapyan","year":"2018","unstructured":"Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in vanets, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954\u2013958.","journal-title":"Autom. Control Comput. Sci."},{"key":"7308_CR6","doi-asserted-by":"publisher","first-page":"971","DOI":"10.3103\/S0146411618080084","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971\u2013976.","journal-title":"Autom. Control Comput. Sci."},{"key":"7308_CR7","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., and Zubkov, E., Estimation of applicability of modern neural network methods for preventing cyberthreats to self-organizing network infrastructures of digital economy platforms, SHS Web Conf., 2018, vol. 44. https:\/\/doi.org\/10.1051\/shsconf\/20184400044","DOI":"10.1051\/shsconf\/20184400044"},{"key":"7308_CR8","unstructured":"Krundyshev, V. and Kalinin, M., Hybrid neural network frame work for detection of cyber attacks at smart infrastructures, Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, 2019, pp. 129\u2013135."},{"key":"7308_CR9","doi-asserted-by":"publisher","first-page":"977","DOI":"10.3103\/S0146411618080163","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp.\u00a0977\u2013983.","journal-title":"Autom. Control Comput. Sci."},{"key":"7308_CR10","doi-asserted-by":"crossref","unstructured":"Lavrova, D., Zegzhda, D., and Yarmak, A., Using GRU neural network for cyber-attack detection in automated process control systems, IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, 2019, pp. 1\u20133.","DOI":"10.1109\/BlackSeaCom.2019.8812818"},{"key":"7308_CR11","doi-asserted-by":"publisher","first-page":"874","DOI":"10.3103\/S0146411617080296","volume":"51","author":"P.D. Zegzhda","year":"2017","unstructured":"Zegzhda, P.D., Malyshev, E.V., and Pavlenko, E.Y., The use of an artificial neural network to detect automatically managed accounts in social networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 874\u2013880.","journal-title":"Autom. Control Comput. Sci."},{"key":"7308_CR12","doi-asserted-by":"crossref","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, 2019, pp. 129\u2013135.","DOI":"10.1109\/WorldS4.2019.8904022"},{"key":"7308_CR13","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.3390\/s19051141","volume":"19","author":"M. El-hajj","year":"2019","unstructured":"El-hajj, M., et al., A survey of Internet of Things (IoT) authentication schemes, Sensors, 2019, vol. 19, no. 5, p.\u00a01141.","journal-title":"Sensors"},{"key":"7308_CR14","doi-asserted-by":"publisher","first-page":"743","DOI":"10.3103\/S0146411616080290","volume":"50","author":"A.G. Busygin","year":"2016","unstructured":"Busygin, A.G., Konoplev, A.S., and Kalinin, M.O., Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 743\u2013748.","journal-title":"Autom. Control Comput. Sci."},{"key":"7308_CR15","doi-asserted-by":"publisher","unstructured":"Busygin, A., Konoplev, A., Kalinin, M., and Zegzhda, D., Floating genesis block enhancement for blockchain based routing between connected vehicles and software-defined VANET security services, ACM International Conference Proceeding Series, 2018. https:\/\/doi.org\/10.1145\/3264437.3264463","DOI":"10.1145\/3264437.3264463"},{"key":"7308_CR16","doi-asserted-by":"publisher","first-page":"743","DOI":"10.3103\/S0146411616080290","volume":"50","author":"A.G. Busygin","year":"2016","unstructured":"Busygin, A.G., Konoplev, A.S., and Kalinin, M.O., Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 743\u2013748.","journal-title":"Autom. Control Comput. Sci."},{"key":"7308_CR17","doi-asserted-by":"publisher","first-page":"879","DOI":"10.3103\/S0146411619080029","volume":"53","author":"E.B. Aleksandrova","year":"2019","unstructured":"Aleksandrova, E.B., Yarmak, A.V., and Kalinin, M.O., Analysis of approaches to group authentication in large-scale industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 879\u2013882.","journal-title":"Autom. Control Comput. Sci."},{"key":"7308_CR18","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.3103\/S0146411619080133","volume":"53","author":"D.S. Lavrova","year":"2019","unstructured":"Lavrova, D.S., Forecasting the state of components of smart grids for early detection of cyberattacks, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1023\u20131025.","journal-title":"Autom. Control Comput. Sci."},{"key":"7308_CR19","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M. Prevention of false data injections in smart infrastructures, 2019 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2019, 2019. https:\/\/doi.org\/10.1109\/BlackSeaCom.2019.8812786","DOI":"10.1109\/BlackSeaCom.2019.8812786"},{"key":"7308_CR20","unstructured":"Chalapathi, G.S.S., et al., Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions, 2019. arXiv:1912.00595."},{"key":"7308_CR21","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V. Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73\u201379. https:\/\/doi.org\/10.1145\/3136825.3136890","DOI":"10.1145\/3136825.3136890"},{"key":"7308_CR22","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V. Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, 2018 IEEE International Black Sea Conference on Communications and Networking, 2018. https:\/\/doi.org\/10.1109\/BlackSeaCom.2018.8433628","DOI":"10.1109\/BlackSeaCom.2018.8433628"},{"key":"7308_CR23","doi-asserted-by":"publisher","first-page":"993","DOI":"10.3103\/S0146411618080308","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Ivanov, D.V., Moskvin, D.A., and Kubrin, G.S., Actual security threats for vehicular and mobile ad hoc networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 993\u2013999.","journal-title":"Autom. Control Comput. Sci."},{"key":"7308_CR24","unstructured":"Aleksandrova, E.B. and Rekhviashvili, I.Sh., Organization of recall for the ring signature scheme, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2019, no. 2, pp. 80\u201385."},{"key":"7308_CR25","unstructured":"Post-Quantum Cryptography. Round 2 Submissions, 2017. https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography."},{"key":"7308_CR26","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1504\/IJHPCN.2018.093236","volume":"11","author":"S. Wang","year":"2018","unstructured":"Wang, S., Zhao, R., and Zhang, Y., Lattice-based ring signature scheme under the random oracle model, Int. J. High Perform. Comput. Networking, 2018, vol. 11, no. 4, pp. 332\u2013341.","journal-title":"Int. J. High Perform. Comput. Networking"},{"key":"7308_CR27","doi-asserted-by":"crossref","unstructured":"Slamanig, D., Spreitzer, R., and Unterluggauer, T., Linking-based revocation for group signatures: A pragmatic approach for efficient revocation checks, International Conference on Cryptology in Malaysia, 2016, pp. 364\u2013388.","DOI":"10.1007\/978-3-319-61273-7_18"},{"key":"7308_CR28","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1002\/sec.418","volume":"5","author":"Q. Tang","year":"2012","unstructured":"Tang, Q., Public key encryption supporting plaintext equality test and user-specified authorization, Secur. Commun. Networks, 2012, vol. 5, no. 12, pp. 1351\u20131362.","journal-title":"Secur. Commun. Networks"},{"key":"7308_CR29","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A., How to share a secret, Commun. ACM, 1979, vol. 22, no. 11, pp. 612\u2013613.","journal-title":"Commun. ACM"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080039.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411620080039","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080039.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:49Z","timestamp":1773612229000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411620080039"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":29,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7308"],"URL":"https:\/\/doi.org\/10.3103\/s0146411620080039","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"15 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}