Author:
Belim S. V.,Bogachenko N. F.
Subject
Signal Processing,Control and Systems Engineering,Software
Reference14 articles.
1. Shamir, A., How to share a secret, Commun. ACM, 1979, vol. 22, no. 11, pp. 612–613.
2. Nojoumian, M. and Stinson, D.R., Sequential secret sharing as a new hierarchical access structure, J. Internet Serv. Inf. Secur., 2015, vol. 5, pp. 24–32.
3. Parvatov, N.G., Perfect secret sharing schemes, Prikl. Diskretnaya Mat., 2008, no. 2, pp. 50–57.
4. Aleksandrova, E.B., Shkorkina, E.N., and Kalinin, M.O., Organization of the quantum cryptographic keys distribution system for transportation infrastructure users, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 969–971.
5. Aleksandrova, E.B., Yarmak, A.V., and Kalinin, M.O., Analysis of approaches to group authentication in large-scale industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 879–882.