{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T12:37:14Z","timestamp":1768739834068,"version":"3.49.0"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[1995,9,1]],"date-time":"1995-09-01T00:00:00Z","timestamp":809913600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Cryptology"],"published-print":{"date-parts":[[1995,9]]},"DOI":"10.1007\/bf00191355","type":"journal-article","created":{"date-parts":[[2004,8,26]],"date-time":"2004-08-26T23:22:23Z","timestamp":1093562543000},"page":"189-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":71,"title":["On key storage in secure networks"],"prefix":"10.1007","volume":"8","author":[{"given":"Martin","family":"Dyer","sequence":"first","affiliation":[]},{"given":"Trevor","family":"Fenner","sequence":"additional","affiliation":[]},{"given":"Alan","family":"Frieze","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Thomason","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF00191355_CR1","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/0022-0000(79)90045-X","volume":"18","author":"D. Angluin","year":"1979","unstructured":"D. Angluin and L. G. Valiant, Fast probabilistic algorithms for Hamiltonian circuits and matchings, Journal of Computer and System Sciences\n18 (1979), 155\u2013193.","journal-title":"Journal of Computer and System Sciences"},{"key":"BF00191355_CR2","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/978-1-4757-0602-4_22","volume-title":"Advances in Cryptology: Proceedings of Eurocrypt 82","author":"R. Blom","year":"1983","unstructured":"R. Blom, Non-public key distribution, in Advances in Cryptology: Proceedings of Eurocrypt 82, Plenum, New York, 1983, pp. 231\u2013236."},{"key":"BF00191355_CR3","series-title":"Lecture Notes in Computer Science","first-page":"335","volume-title":"Advances in Cryptology: Proceedings of Eurocrypt 84","author":"R. Blom","year":"1984","unstructured":"R. Blom, An optimal class of symmetric key generation systems, in Advances in Cryptology: Proceedings of Eurocrypt 84, Lecture Notes in Computer Science, Vol. 209, Springer-Verlag, Berlin, 1984, pp. 335\u2013338."},{"key":"BF00191355_CR4","volume-title":"Random Graphs","author":"B. Bollob\u00f3s","year":"1985","unstructured":"B. Bollob\u00f3s, Random Graphs, Academic Press, London, 1985."},{"key":"BF00191355_CR5","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/0097-3165(82)90004-8","volume":"33","author":"P. Erd\u00f3s","year":"1982","unstructured":"P. Erd\u00f3s, P. Frankl, and Z. F\u00fcredi, Families of finite sets in which no set is covered by the union of two others, Journal of Combinatorial Theory, Series A\n33 (1982), 158\u2013166.","journal-title":"Journal of Combinatorial Theory, Series A"},{"key":"BF00191355_CR6","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/BF02772959","volume":"51","author":"P. Erd\u00f3s","year":"1985","unstructured":"P. Erd\u00f3s, P. Frankl, and Z. F\u00fcredi, Families of finite sets in which no set is covered by the union of r others, Israel Journal of Mathematics\n51 (1985), 79\u201389.","journal-title":"Israel Journal of Mathematics"},{"key":"BF00191355_CR7","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/BF02252869","volume":"2","author":"Li Gong","year":"1990","unstructured":"Li Gong and D. H. Wheeler, A matrix key distribution scheme, Journal of Cryptology\n2 (1990), 51\u201359.","journal-title":"Journal of Cryptology"},{"key":"BF00191355_CR8","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0166-218X(88)90068-6","volume":"21","author":"C. J. Mitchell","year":"1988","unstructured":"C. J. Mitchell and F. C. Piper, Key storage in secure networks, Discrete Applied Mathematics\n21 (1988), 215\u2013228.","journal-title":"Discrete Applied Mathematics"},{"key":"BF00191355_CR9","volume-title":"Ten Lectures on the Probabilistic Method","author":"J. Spencer","year":"1987","unstructured":"J. Spencer, Ten Lectures on the Probabilistic Method, SIAM, Philadelphia, PA, 1987."}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00191355.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF00191355\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00191355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00191355.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:21:07Z","timestamp":1586334067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF00191355"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,9]]},"references-count":9,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1995,9]]}},"alternative-id":["BF00191355"],"URL":"https:\/\/doi.org\/10.1007\/bf00191355","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,9]]},"assertion":[{"value":"21 August 1992","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 1994","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}