{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:18:11Z","timestamp":1775053091757,"version":"3.50.1"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1995,5,1]],"date-time":"1995-05-01T00:00:00Z","timestamp":799286400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1995,5]]},"DOI":"10.1007\/bf01388388","type":"journal-article","created":{"date-parts":[[2005,4,2]],"date-time":"2005-04-02T03:37:09Z","timestamp":1112413029000},"page":"261-267","source":"Crossref","is-referenced-by-count":9,"title":["Key distribution patterns using Minkowski planes"],"prefix":"10.1007","volume":"5","author":[{"given":"Christine M.","family":"O'Keefe","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"CR1","volume-title":"Design Theory","author":"T. Beth","year":"1986","unstructured":"T. Beth, D. Jungnickel and H. Lenz,Design Theory, Cambridge University Press, Cambridge (1986)."},{"key":"CR2","volume-title":"Einf\u00fchrung in die endliche Geometrie II: Projektive R\u00e4ume","author":"A. Beutelspachen","year":"1983","unstructured":"A. Beutelspachen,Einf\u00fchrung in die endliche Geometrie II: Projektive R\u00e4ume, Bibliographisches Institut, Mannheim (1983)."},{"key":"CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-62012-6","volume-title":"Finite Geometries","author":"P. Dembowski","year":"1968","unstructured":"P. Dembowski,Finite Geometries, Springer-Verlag, Berlin Heidelberg (1968)."},{"key":"CR4","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/BF02252869","volume":"2","author":"L. Gong","year":"1990","unstructured":"L. Gong and D. J. Wheeler, A matrix key-distribution scheme.J. Cryptology, Vol. 2 (1990) pp. 51?59.","journal-title":"J. Cryptology"},{"key":"CR5","volume-title":"Combinatorial techniques for key storage reduction in secure networks","author":"C. J. Mitchell","year":"1988","unstructured":"C. J. Mitchell, Combinatorial techniques for key storage reduction in secure networks, Technical memo, Hewlett-Packard Laboratories, Bristol (1988)."},{"key":"CR6","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0166-218X(88)90068-6","volume":"21","author":"C. J. Mitchell","year":"1988","unstructured":"C. J. Mitchell and F. C. Piper, Key storage in secure networks,Discrete Applied Mathematics, Vol. 21 (1988) pp. 215?228.","journal-title":"Discrete Applied Mathematics"},{"key":"CR7","first-page":"195","volume":"7","author":"C. M. O'Keefe","year":"1993","unstructured":"C. M. O'Keefe, Applications of finite geometries to information security,Australas. J. Combin., Vol. 7 (1993), pp. 195?212.","journal-title":"Australas. J. Combin."},{"key":"CR8","unstructured":"K. A. S. Quinn,Combinatorial Structures with Applications to Information Theory, Ph.D. thesis, RHBNC, University of London (1991)."},{"key":"CR9","volume-title":"Contemporary Cryptology","year":"1992","unstructured":"G. J. Simmons (ed.),Contemporary Cryptology, IEEE Press, New York (1992)."},{"key":"CR10","first-page":"327","volume-title":"Finite Geometries","author":"J. A. Thas","year":"1985","unstructured":"J. A. Thas, Circle geometries and generalized quadrangles,Finite Geometries, Dekker, New York (1985) pp. 327?352."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388388\/fulltext.html","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388388.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388388\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T12:14:18Z","timestamp":1556799258000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01388388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,5]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1995,5]]}},"alternative-id":["BF01388388"],"URL":"https:\/\/doi.org\/10.1007\/bf01388388","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,5]]}}}