{"id":"https://openalex.org/W1550528471","doi":"https://doi.org/10.1023/a:1026421315292","title":"How to Build Robust Shared Control Systems","display_name":"How to Build Robust Shared Control Systems","publication_year":1998,"publication_date":"1998-11-01","ids":{"openalex":"https://openalex.org/W1550528471","doi":"https://doi.org/10.1023/a:1026421315292","mag":"1550528471"},"language":"en","primary_location":{"id":"doi:10.1023/a:1026421315292","is_oa":false,"landing_page_url":"https://doi.org/10.1023/a:1026421315292","pdf_url":null,"source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046983053","display_name":"Ross Anderson","orcid":"https://orcid.org/0000-0001-8697-5682"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ross Anderson","raw_affiliation_strings":["Computer Laboratory, Cambridge University, Pembroke Street, Cambridge, CB2 3QG, U.K","Computer Laboratory, Cambridge University, Pembroke Street, Cambridge, CB2 3QG, U.K.#TAB#"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Laboratory, Cambridge University, Pembroke Street, Cambridge, CB2 3QG, U.K","institution_ids":["https://openalex.org/I241749"]},{"raw_affiliation_string":"Computer Laboratory, Cambridge University, Pembroke Street, Cambridge, CB2 3QG, U.K.#TAB#","institution_ids":["https://openalex.org/I241749"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074480584","display_name":"Cunsheng Ding","orcid":"https://orcid.org/0000-0001-9392-9860"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Cunsheng Ding","raw_affiliation_strings":["Department of Information Systems and Computer Science, National University of Singapore, Lower Kent Ridge Road, Singapore, 119260","Department of Information Systems and Computer Science, National University of Singapore, Lower Kent Ridge Road, Singapore 119260"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Computer Science, National University of Singapore, Lower Kent Ridge Road, Singapore, 119260","institution_ids":["https://openalex.org/I165932596"]},{"raw_affiliation_string":"Department of Information Systems and Computer Science, National University of Singapore, Lower Kent Ridge Road, Singapore 119260","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026698531","display_name":"Tor Helleseth","orcid":"https://orcid.org/0000-0003-1290-3541"},"institutions":[{"id":"https://openalex.org/I4432739","display_name":"University of Bergen","ror":"https://ror.org/03zga2b32","country_code":"NO","type":"education","lineage":["https://openalex.org/I4432739"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Tor Helleseth","raw_affiliation_strings":["Department of Informatics, University of Bergen, HIB, N-5020 Bergen, Norway#TAB#"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Bergen, HIB, N-5020 Bergen, Norway#TAB#","institution_ids":["https://openalex.org/I4432739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030629295","display_name":"Torleiv Kl\u00f8ve","orcid":"https://orcid.org/0000-0002-9853-4136"},"institutions":[{"id":"https://openalex.org/I4432739","display_name":"University of Bergen","ror":"https://ror.org/03zga2b32","country_code":"NO","type":"education","lineage":["https://openalex.org/I4432739"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Torleiv Klove","raw_affiliation_strings":["Department of Informatics, University of Bergen, HIB, N-5020, Bergen, Norway","Department of Informatics, University of Bergen, HIB, N-5020 Bergen, Norway#TAB#"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Bergen, HIB, N-5020, Bergen, Norway","institution_ids":["https://openalex.org/I4432739"]},{"raw_affiliation_string":"Department of Informatics, University of Bergen, HIB, N-5020 Bergen, Norway#TAB#","institution_ids":["https://openalex.org/I4432739"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046983053"],"corresponding_institution_ids":["https://openalex.org/I241749"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":0.5498,"has_fulltext":false,"cited_by_count":118,"citation_normalized_percentile":{"value":0.73519832,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"15","issue":"2","first_page":"111","last_page":"124"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7081244587898254},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5086380243301392},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5003728866577148},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.49524441361427307},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.48954686522483826},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4804636836051941},{"id":"https://openalex.org/keywords/coding-theory","display_name":"Coding theory","score":0.42210516333580017},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.41304588317871094},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3484714925289154},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21802663803100586},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.17619270086288452},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08403173089027405}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7081244587898254},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5086380243301392},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5003728866577148},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.49524441361427307},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.48954686522483826},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4804636836051941},{"id":"https://openalex.org/C113709454","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Coding theory","level":2,"score":0.42210516333580017},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.41304588317871094},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3484714925289154},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21802663803100586},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.17619270086288452},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08403173089027405},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1023/a:1026421315292","is_oa":false,"landing_page_url":"https://doi.org/10.1023/a:1026421315292","pdf_url":null,"source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W30066908","https://openalex.org/W121517661","https://openalex.org/W1533708960","https://openalex.org/W1606480398","https://openalex.org/W1973483608","https://openalex.org/W1983629106","https://openalex.org/W1990304797","https://openalex.org/W2115823234","https://openalex.org/W2141420453","https://openalex.org/W2159401786","https://openalex.org/W2398870078","https://openalex.org/W2912577494","https://openalex.org/W2970097841","https://openalex.org/W4211147273","https://openalex.org/W6605757092","https://openalex.org/W6732987287"],"related_works":["https://openalex.org/W2363798811","https://openalex.org/W1506290728","https://openalex.org/W62672958","https://openalex.org/W1182676130","https://openalex.org/W2141593530","https://openalex.org/W3008454111","https://openalex.org/W30066908","https://openalex.org/W2999290243","https://openalex.org/W4383889033","https://openalex.org/W2760048697"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":14},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":11},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2026-05-13T08:25:38.343686","created_date":"2025-10-10T00:00:00"}
