{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:04Z","timestamp":1725488644368},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540564133"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-47555-9_41","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T23:23:49Z","timestamp":1186615429000},"page":"467-471","source":"Crossref","is-referenced-by-count":4,"title":["Information-Theoretic Bounds for Authentication Frauds"],"prefix":"10.1007","author":[{"given":"Andrea","family":"Sgarro","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"G. Simmons, \u201cA survey of information authentication\u201d, Proceedings of the IEEE, may 1988, 603\u2013620","DOI":"10.1109\/5.4445"},{"issue":"4","key":"41_CR2","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/18.86970","volume":"IT-37","author":"R. Johannesson","year":"1991","unstructured":"R. Johannesson, A. Sgarro, \u201cStrengthening Simmons\u2019 bound on impersonation\u201d, IEEE Transactions on Information Theory, vol.IT-37, n.4 (1991) 1182\u20131185","journal-title":"IEEE Transactions on Information Theory"},{"key":"41_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/3-540-46877-3_25","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 90","author":"A. Sgarro","year":"1991","unstructured":"A. Sgarro, \u201cLower bounds for authentication codes with splitting\u201d, in \u201cAdvances in Cryptology \u2014 Eurocrypt\u2019 90\u201d, ed. by I. B. Damg\u00e5rd, Springer Verlag, Lecture Notes in Computer Science 473 (1991) 283\u2013293"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47555-9_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:14:04Z","timestamp":1605647644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47555-9_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540564133"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/3-540-47555-9_41","relation":{},"subject":[]}}