{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:18:10Z","timestamp":1775053090695,"version":"3.50.1"},"reference-count":6,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1994,4,1]],"date-time":"1994-04-01T00:00:00Z","timestamp":765158400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1994,4]]},"DOI":"10.1007\/bf01578871","type":"journal-article","created":{"date-parts":[[2005,4,28]],"date-time":"2005-04-28T08:10:50Z","timestamp":1114675850000},"page":"177-191","source":"Crossref","is-referenced-by-count":17,"title":["Some constructions for key distribution patterns"],"prefix":"10.1007","volume":"4","author":[{"given":"Kathleen A. S.","family":"Quinn","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology: Proceedings of Eurocrypt 84","author":"R. Blom","year":"1985","unstructured":"Blom, R., An optimal class of symmetric key generation systems,Advances in Cryptology: Proceedings of Eurocrypt 84, Springer-Verlag, Berlin. Lecture Notes in Computer Science, Vol. 209 (1985), pp. 335\u2013338."},{"key":"CR2","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/BF02252869","volume":"2","author":"L. Gong","year":"1990","unstructured":"Gong, L. and Wheeler, D.J., A matrix key-distribution scheme.J. Cryptology, Vol. 2 (1990), pp. 51\u201359.","journal-title":"J. Cryptology"},{"key":"CR3","volume-title":"Design Theory","author":"D.R. Hughes","year":"1988","unstructured":"Hughes, D.R. and Piper F.C.,Design Theory, Cambridge, MA: Cambridge University Press (1988)."},{"key":"CR4","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/S0195-6698(84)80028-1","volume":"5","author":"D. Jungnickel","year":"1984","unstructured":"Jungnickel, D. and Vedder, K., On the geometry of planar difference sets,Europ. J. Comb., Vol. 5 (1984), pp. 143\u2013148.","journal-title":"Europ. J. Comb."},{"key":"CR5","volume-title":"Combinatorial techniques for key storage reduction in secure networks","author":"C.J. Mitchell","year":"1988","unstructured":"Mitchell, C.J., Combinatorial techniques for key storage reduction in secure networks. Technical memo, Hewlett Packard Laboratories, Bristol, (1988)."},{"key":"CR6","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0166-218X(88)90068-6","volume":"21","author":"C.J. Mitchell","year":"1988","unstructured":"Mitchell, C.J. and Piper, F.C., Key storage in secure networks,Discrete Applied Mathematics, Vol. 21 (1988), pp. 215\u2013228.","journal-title":"Discrete Applied Mathematics"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01578871.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01578871\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01578871","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T11:08:55Z","timestamp":1556881735000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01578871"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,4]]},"references-count":6,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1994,4]]}},"alternative-id":["BF01578871"],"URL":"https:\/\/doi.org\/10.1007\/bf01578871","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1994,4]]}}}