{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:17:55Z","timestamp":1725488275641},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540576006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_2","type":"book-chapter","created":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T22:16:46Z","timestamp":1185920206000},"page":"12-27","source":"Crossref","is-referenced-by-count":2,"title":["Optimal Authentication Systems"],"prefix":"10.1007","author":[{"given":"R.","family":"Safavi-Naini","sequence":"first","affiliation":[]},{"given":"L.","family":"Tombak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","first-page":"141","volume":"43","author":"E. Brickell","year":"1984","unstructured":"E. Brickell, A Few Results in Message Authentication, Congressus Numerantium, vol 43, 1984, pp 141\u2013154.","journal-title":"Congressus Numerantium"},{"issue":"4","key":"2_CR2","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/18.86970","volume":"37","author":"R. Johansen","year":"1991","unstructured":"R. Johansen, A. Sgarro Strengthening Simmons\u2019 Bound in Impersonation, IEEE Transactions on Information Theory, vol 37, No 4, July 1991, pp 1182\u20131185.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR3","unstructured":"J.L. Massey, Cryptography-A Selective Survey, Proc. of 1985 Int. Tirrenia Workshop on Digital Communication, Tirrenia, 1985, Digital Communications, ed. E. Biglieri and G. Pratti, Elsevier Science Publ., 1986, North-Holland, pp 3\u201325"},{"issue":"5","key":"2_CR4","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/5.4440","volume":"76","author":"J.L. Massey","year":"1988","unstructured":"J.L. Massey, Introduction to Contemporary Cryptography, Proceedings of the IEEE, vol 76, No 5, May 1988, pp 533\u2013549.","journal-title":"Proceedings of the IEEE"},{"key":"2_CR5","unstructured":"D. Pei Information-Theoretic Bounds for Authentication Codes and PBIB, Asiacrypt 1991, Ramp Session."},{"key":"2_CR6","unstructured":"R. Safavi, L. Tombak, Authentication Codes under Impersonation Attack, Proc. of Auscrypt 1992, to appear."},{"key":"2_CR7","first-page":"161","volume":"45","author":"G.J. Simmons","year":"1984","unstructured":"G.J. Simmons, Message Authentication: A Game on Hypergraphs, Congressus Numerantium, Vol 45, 1984, pp 161\u2013192.","journal-title":"Congressus Numerantium"},{"key":"2_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/3-540-39568-7_32","volume-title":"Proc. of Crypto 84","author":"G.J. Simmons","year":"1985","unstructured":"G.J. Simmons, Authentication Theory\/Coding Theory, Proc. of Crypto 84, Lecture Notes in Computer Science 196, Springer 1985, pp 411\u2013432."},{"key":"2_CR9","first-page":"413","volume":"34","author":"G.J. Simmons","year":"1982","unstructured":"G.J. Simmons, A Game Theory Model of Digital Message Authentication, Congressus Numerantium, Vol. 34, 1982, pp 413\u2013424.","journal-title":"Congressus Numerantium"},{"issue":"5","key":"2_CR10","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/5.4445","volume":"76","author":"G.J. Simmons","year":"1988","unstructured":"G.J. Simmons, A Survey of Information Authentication, Proceedings of the IEEE vol 76, No 5, May 1988, pp 603\u2013619.","journal-title":"Proceedings of the IEEE"},{"key":"2_CR11","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/BF00206324","volume":"1","author":"D.R. Stinson","year":"1988","unstructured":"D.R. Stinson, Some Constructions and Bounds for Authentication Codes, Journal of Cryptology, No 1, 1988, pp 37\u201351.","journal-title":"Journal of Cryptology"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/BF02252868","volume":"2","author":"D.R. Stinson","year":"1990","unstructured":"D.R. Stinson, The Combinatorics of Authentication and Secrecy Codes, Journal of Cryptology, No 2 (1990), pp 23\u201349.","journal-title":"Journal of Cryptology"},{"key":"2_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/3-540-46766-1_4","volume-title":"Proceedings Crypto 91","author":"D.R. Stinson","year":"1992","unstructured":"D.R. Stinson, Combinatorial Characterization of Authentication Codes, Proceedings Crypto 91, Lecture Notes in Computer Science 576, Springer 1992, pp 62\u201372."},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"L. Tombak, R. Safavi, Authentication Codes with Perfect Protection, Proc. of Auscrypt 1992, to appear.","DOI":"10.1007\/3-540-57220-1_48"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/BF00190800","volume":"2","author":"M. Walker","year":"1990","unstructured":"M. Walker Information-Theoretic Bounds for Authentication Schemes, Journal of Cryptology, No 2, 1990, pp 131\u2013143.","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:15:27Z","timestamp":1605629727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_2","relation":{},"subject":[]}}