{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:59Z","timestamp":1773615719396,"version":"3.50.1"},"reference-count":33,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700949","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:59Z","timestamp":1741962179000},"page":"1289-1296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Model of a Distributed Storage System for Crypto Wallet Private Keys"],"prefix":"10.3103","volume":"58","author":[{"given":"M. R.","family":"Salikhov","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7793_CR1","unstructured":"Exodus review. https:\/\/www.fxempire.com\/crypto\/wallets\/exodus. Cited December 5, 2023."},{"key":"7793_CR2","unstructured":"Eidoo. https:\/\/www.cryptowisser.com\/wallet\/eidoo. Cited December 5, 2023."},{"key":"7793_CR3","unstructured":"Atomic wallet review. https:\/\/www.finder.com\/in\/atomicwallet-review. Cited December 5, 2023."},{"key":"7793_CR4","unstructured":"Keepkey wallet review. https:\/\/www.finder.com\/in\/keepkeywallet-review. Cited December 5, 2023."},{"key":"7793_CR5","unstructured":"Corva, F., Ledger Nano X review, 2022. https:\/\/www.finder.com\/ledger-nano-x. Cited December 5, 2023."},{"key":"7793_CR6","unstructured":"Ledger Nano S. https:\/\/www.finder.com\/in\/ledger-nano-swallet-review. Cited December 5, 2023."},{"key":"7793_CR7","unstructured":"Trezor. https:\/\/www.fxempire.com\/crypto\/wallets\/trezor. Cited December 5, 2023."},{"key":"7793_CR8","unstructured":"Corazon review. https:\/\/www.finder.com.au\/corazon-modelt-wallet-review. Cited December 5, 2023."},{"key":"7793_CR9","unstructured":"CoolWalletS. https:\/\/www.finder.com\/in\/coolwallet-s-walletreview. Cited December 5, 2023."},{"key":"7793_CR10","unstructured":"Sugi Review. https:\/\/www.finder.com\/sugi-wallet-review. Cited December 5, 2023."},{"key":"7793_CR11","unstructured":"Cryptocurrency wallet types. https:\/\/www.binance.vision\/blockchain\/ crypto-wallet-typesexplained. Cited December 5, 2023."},{"key":"7793_CR12","unstructured":"Cryptocurrency wallets. https:\/\/www.finder.com\/in\/cryptocurrency\/wallets. Cited December 5, 2023."},{"key":"7793_CR13","unstructured":"Coinbase exchange review. https:\/\/www.finder.com\/in\/coinbase-exchange-review. Cited December 5, 2023."},{"key":"7793_CR14","unstructured":"Edge wallet review. https:\/\/www.finder.com\/edge-walletreview. Cited December 5, 2023."},{"key":"7793_CR15","unstructured":"Coinomi wallet review. https:\/\/www.finder.com\/in\/coinomiwallet-review. Cited December 6, 2023."},{"key":"7793_CR16","unstructured":"Enjin smart wallet. https:\/\/www.finder.com\/enjin-smartwallet. Cited December 6, 2023."},{"key":"7793_CR17","unstructured":"Abra cryptocurrency wallet. https:\/\/www.finder.com\/abracryptocurrency-app. Cited December 6, 2023."},{"key":"7793_CR18","doi-asserted-by":"publisher","unstructured":"Sas, C. and Khairuddin, I.E., Exploring trust in bitcoin technology, Proceedings of the Annual Meeting of the Australian Special Interest Group for Computer Human Interaction, Parkville, Australia, 2015, Ploderer, B., Carter, M., Gibbs, M., Smith, W., and Vetere, F., Eds., New York: Association for Computing Machinery, 2015, pp. 338\u2013342. https:\/\/doi.org\/10.1145\/2838739.2838821","DOI":"10.1145\/2838739.2838821"},{"key":"7793_CR19","doi-asserted-by":"publisher","unstructured":"Jarecki, S., Kiayias, A., Krawczyk, H., and Xu, J., Highly-efficient and composable password-protected secret sharing (or: how to protect your bitcoin wallet online), 2016 \n               IEEE European Symposium on Security and Privacy (EuroS&P), Saarbr\u00fccken, Germany, 2016, IEEE, 2016, pp. 1\u201316. https:\/\/doi.org\/10.1109\/eurosp.2016.30","DOI":"10.1109\/eurosp.2016.30"},{"key":"7793_CR20","doi-asserted-by":"publisher","unstructured":"Kaushal, P.K., Bagga, A., and Sobti, R., Evolution of bitcoin and security risk in bitcoin wallets, 2017 International Conference on Computer, Communications and Electronics (Comptelix), Jaipur, India, 2017, IEEE, 2017, pp.\u00a0173\u2013178. https:\/\/doi.org\/10.1109\/comptelix.2017.8003959","DOI":"10.1109\/comptelix.2017.8003959"},{"key":"7793_CR21","doi-asserted-by":"publisher","unstructured":"Liu, Yi., Li, R., Liu, X., Wang, J., Zhang, L., Tang, Ch., and Kang, H., An efficient method to enhance Bitcoin wallet security, 2017 11th IEEE International Conference on Anti-Counterfeiting, Security, and Identification (ASID), Xiamen, China, 2017, IEEE, 2017, pp. 26\u201329. https:\/\/doi.org\/10.1109\/icasid.2017.8285737","DOI":"10.1109\/icasid.2017.8285737"},{"key":"7793_CR22","doi-asserted-by":"publisher","unstructured":"Liu, Yi., Liu, X., Zhang, L., Tang, Ch., and Kang, H., An efficient strategy to eliminate malleability of bitcoin transaction, 2017 4th International Conference on Systems and Informatics (ICSAI), Hangzhou, China, 2017, IEEE, 2017, pp. 960\u2013964. https:\/\/doi.org\/10.1109\/icsai.2017.8248424","DOI":"10.1109\/icsai.2017.8248424"},{"key":"7793_CR23","doi-asserted-by":"publisher","unstructured":"Okpara, O.S. and Bekaroo, G., Cam-Wallet: Fingerprint-based authentication in M-wallets using embedded cameras, 2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC \/ I&CPS Europe), Milan, 2017, IEEE, 2017, pp. 1\u20135. https:\/\/doi.org\/10.1109\/eeeic.2017.7977654","DOI":"10.1109\/eeeic.2017.7977654"},{"key":"7793_CR24","doi-asserted-by":"publisher","unstructured":"Chen, P.-W., Jiang, B.-S., and Wang, C.-H., Blockchain-based payment collection supervision system using pervasive Bitcoin digital wallet, 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Rome, 2017, IEEE, 2017, pp. 139\u2013146. https:\/\/doi.org\/10.1109\/wimob.2017.8115844","DOI":"10.1109\/wimob.2017.8115844"},{"key":"7793_CR25","doi-asserted-by":"publisher","unstructured":"Dikshit, P. and Singh, K., Efficient weighted threshold ECDSA for securing bitcoin wallet, 2017 ISEA Asia Security and Privacy (ISEASP), Surat, India, 2017, IEEE, 2017, pp. 1\u20139. https:\/\/doi.org\/10.1109\/iseasp.2017.7976994","DOI":"10.1109\/iseasp.2017.7976994"},{"key":"7793_CR26","first-page":"1749","volume":"11","author":"N.S. Mogilevskaya","year":"2011","unstructured":"Mogilevskaya, N.S., Kulbikayan, R.V., and Zhuravlev, L.A., Threshold file sharing based on bit masks: Concept and possible use, Vestnik Donskogo Gosudarstvennogo Tekhnicheskogo Universiteta, 2011, vol. 11, no. 10, pp.\u00a01749\u20131754.","journal-title":"Vestnik Donskogo Gosudarstvennogo Tekhnicheskogo Universiteta"},{"key":"7793_CR27","unstructured":"Prezident of the Russian Federation, Strategiya natsional\u2019noi bezopasnosti Rossiiskoi Federatsii (National Security Strategy of the Russian Federation), Moscow: Prospekt, 2016."},{"key":"7793_CR28","doi-asserted-by":"publisher","unstructured":"Benet, J., IPFS\u2014Content addressed, versioned, P2P file system, arXiv Preprint, 2014. https:\/\/doi.org\/10.48550\/arXiv.1407.3561","DOI":"10.48550\/arXiv.1407.3561"},{"key":"7793_CR29","unstructured":"Vorick, D. and Champine, L., Sia: Simple decentralized storage, blockchainlab. https:\/\/sia.tech\/sia.pdf. Cited December 8, 2023."},{"key":"7793_CR30","unstructured":"Storj: A decentralized cloud storage network framework. https:\/\/github.com\/storj\/whitepaper. Cited December 8, 2023."},{"key":"7793_CR31","unstructured":"Hardware wallet & crypto wallet. https:\/\/www.ledger.com\/. Cited December 8, 2023."},{"key":"7793_CR32","unstructured":"Ethos self-custody vault. https:\/\/www.ethos.io. Cited December 8, 2023."},{"key":"7793_CR33","unstructured":"Trezor hardware wallet. https:\/\/trezor.io. Cited December 8, 2023."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700949.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700949","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700949.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:41Z","timestamp":1773612221000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700949"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":33,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7793"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700949","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"18 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author of this work declares that he has no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}