{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:08:26Z","timestamp":1725487706389},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401971"},{"type":"electronic","value":"9783540448648"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44864-0_99","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T15:09:48Z","timestamp":1184598588000},"page":"958-967","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient Dispersal and Encryption Scheme for Secure Distributed Information Storage"],"prefix":"10.1007","author":[{"given":"Sung Jin","family":"Choi","sequence":"first","affiliation":[]},{"given":"Hee Yong","family":"Youn","sequence":"additional","affiliation":[]},{"given":"Bo Kyoung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"99_CR1","series-title":"Lect Notes Comput Sci","first-page":"158","volume-title":"First International Workshop ISW\u2019 97","author":"Y. Desmedt","year":"1997","unstructured":"Yvo Desmedt: Some Recent Research Aspects of Threshold Cryptography: Information Security, First International Workshop ISW\u2019 97, Lecture Notes in Computer Science #1196, M. Mambo E. Okamoto, E. Davida, Ed., (1997) 158\u2013173"},{"key":"99_CR2","doi-asserted-by":"crossref","unstructured":"A. Shamir: How to Share a Secret: Comm. ACM. (1979) 612\u2013613","DOI":"10.1145\/359168.359176"},{"key":"99_CR3","doi-asserted-by":"crossref","unstructured":"E. Karnin, J. Greene, M. Hellman.: On Secret Sharing Systems: IEEE Trans. Information Theory (1983) 35\u201341","DOI":"10.1109\/TIT.1983.1056621"},{"key":"99_CR4","unstructured":"G. R. Blakley, Catherine Meadows: Security of ramp schemes: Advances in Cryptology, Springer-Verlag, (1985) 242\u2013268"},{"key":"99_CR5","unstructured":"A. De Santis and B. Masucci: Multiple Ramp Schemes: IEEE Trans. Information Theory (1999) 1720\u20131728"},{"key":"99_CR6","doi-asserted-by":"crossref","unstructured":"Jay J. Wylie, Michael W. Bigrigg, John D. Strunk, Gregory R. Ganger, Han Kiliccote, Pradeep K. Khosla: Survivable Information Storage systems: IEEE Computer (2000)","DOI":"10.1109\/2.863969"},{"key":"99_CR7","doi-asserted-by":"crossref","unstructured":"Y. Deswarte, L. Blain, J. Fabre: Intrusion Tolerance In Distributed Computing Systems: Proc. IEEE Symp. Security and P privacy, IEEE CS Press, Los Alamitos, Calif (1991) 110\u2013120","DOI":"10.1109\/RISP.1991.130780"},{"key":"99_CR8","first-page":"442","volume-title":"Linear Algebra with Applications","author":"G. Nakos","year":"1998","unstructured":"George Nakos, David Joyner: Linear Algebra with Applications, Brooks\/Cole USA (1998) 442\u2013455"},{"key":"99_CR9","first-page":"274","volume-title":"Numerical Analysis Mathematics of Scientific Computing","author":"D. Kincaid","year":"1996","unstructured":"David Kincaid, Ward Chenney: Numerical Analysis Mathematics of Scientific Computing. 2nd edn, Brooks\/Cole USA (1996) 274\u2013276","edition":"2nd edn"},{"key":"99_CR10","first-page":"216","volume-title":"Linear Algebra","author":"Birkhauser","year":"1997","unstructured":"Birkhauser: Linear Algebra, Birkhauser Boston (1997) 216\u2013219"},{"key":"99_CR11","doi-asserted-by":"crossref","DOI":"10.21236\/ADA461303","volume-title":"On Correlated Failures in Survivable Storage Systems","author":"M. Bakkaloglu","year":"2002","unstructured":"Mehmet Bakkaloglu, Jay J. Wylie, Chenxi Wang, Gregory R. Ganger: On Correlated Failures in Survivable Storage Systems: School of Computer Science Carnegie Mellon University, Pittsburgh, 15213 (2002)"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2014 ICCS 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44864-0_99","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:33:10Z","timestamp":1556670790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44864-0_99"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401971","9783540448648"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-44864-0_99","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}