{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:07:09Z","timestamp":1725487629547},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426721"},{"type":"electronic","value":"9783540454465"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45446-2_23","type":"book-chapter","created":{"date-parts":[[2007,7,22]],"date-time":"2007-07-22T22:11:27Z","timestamp":1185142287000},"page":"357-369","source":"Crossref","is-referenced-by-count":8,"title":["On the Distribution of a Key Distribution Center"],"prefix":"10.1007","author":[{"given":"Paolo","family":"D\u2019Arco","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,16]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"C. Blundo, and P. D\u2019Arco, An Information Theoretic Model for Distributed Key Distribution, Proceedings of the 2000 IEEE International Symposium on Information Theory, pp. 270, 2000.","DOI":"10.1109\/ISIT.2000.866568"},{"issue":"2","key":"23_CR2","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1006\/inco.1996.0095","volume":"131","author":"C. Blundo","year":"1996","unstructured":"C. Blundo, A. De Santis, and U. Vaccaro, Randomness in Distribution Protocols, Information and Computation, vol. 131, no. 2, pp. 111\u2013139, 1996.","journal-title":"Information and Computation"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Cover T. M. and Thomas J. A., Elements of Information Theory, John Wiley & Sons, 1991.","DOI":"10.1002\/0471200611"},{"key":"23_CR4","unstructured":"Knuth D. E. and Yao A. C., The Complexity of Nonuniform Random Number Generation, Algorithms and Complexity, Academic Press, pp. 357\u2013428, 1976."},{"key":"23_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/3-540-48910-X_23","volume-title":"Advances in Cryptology \u2014 Eurocrypt 99","author":"M. Naor","year":"1999","unstructured":"M. Naor, B. Pinkas, and O. Reingold, Distributed Pseudo-random Functions and KDCs, Advances in Cryptology \u2014 Eurocrypt 99, Lecture notes in Computer Science, vol. 1592, pp. 327\u2013346, 1999."},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. M. Needham","year":"1978","unstructured":"R. M. Needham and M. D. Schroeder, Using Encryption for Authentication in Large Networks of Computers, Communications of ACM, vol. 21, pp. 993\u2013999, 1978.","journal-title":"Communications of ACM"},{"key":"23_CR7","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B. C. Neuman","year":"1994","unstructured":"B. C. Neuman and T. Tso, Kerberos: An Authentication Service for Computer Networks, IEEE Transaction on Communications, vol. 32, pp. 33\u201338, 1994.","journal-title":"IEEE Transaction on Communications"},{"issue":"11","key":"23_CR8","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, How to Share a Secret, Communications of ACM, vol. 22, n. 11, pp. 612\u2013613, 1979.","journal-title":"Communications of ACM"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1023\/A:1008268610932","volume":"12","author":"D. R. Stinson","year":"1997","unstructured":"D. R. Stinson, On Some Methods for Unconditional Secure Key Distribution and Broadcast Encryption, Design, Codes and Cryptography, vol. 12, pp. 215\u2013243, 1997.","journal-title":"Design, Codes and Cryptography"}],"container-title":["Lecture Notes in Computer Science","Theoretical Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45446-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,17]],"date-time":"2019-02-17T14:58:05Z","timestamp":1550415485000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45446-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426721","9783540454465"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-45446-2_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}