{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T05:21:01Z","timestamp":1736054461437,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000436","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T15:27:29Z","timestamp":1128698849000},"page":"209-223","source":"Crossref","is-referenced-by-count":3,"title":["Combinatorial structure of A-codes with r-fold security"],"prefix":"10.1007","author":[{"given":"R.","family":"Safavi-Naini","sequence":"first","affiliation":[]},{"given":"L.","family":"Tombak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/BF02252868","volume":"2","author":"D.R. Stinson","year":"1990","unstructured":"D.R. Stinson, The combinatorics of authentication and secrecy codes, Journal Cryptology 2, (1990), 23\u201349.","journal-title":"Journal Cryptology"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"D.R. Stinson, Combinatorial characterization of authentication codes, Lecture Notes in Comput. Sci. 576, Proceedings of Crypto 91, Springer-Verlag, 1992, 62\u201372.","DOI":"10.1007\/3-540-46766-1_4"},{"key":"17_CR3","unstructured":"P. Schobi, Perfect authentication systems for data sources with arbitrary statistics, presented at Eurocrypt '86."},{"key":"17_CR4","unstructured":"J.H. Dinitz, D. Stinson, Contemporary Design Theory. A Collection of Surveys, A Wiley Interscience Publications, JOHN WILEY & SONS, INC, 1992."},{"key":"17_CR5","unstructured":"J. MacWilliams, N. Sloane, The theory of error correcting codes, Noth Holland Publishing Company, 1978."},{"key":"17_CR6","unstructured":"S. Roman, Coding and Information Theory, Springer Verlag, 1992."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"L. Tombak, R. Safavi-Naini, Authentication codes with perfect protection Advances in Cryptology-AusCrypt'92, LNCS 718, Springer-Verlag, 1993, pp 15\u201326.","DOI":"10.1007\/3-540-57220-1_48"},{"key":"17_CR8","unstructured":"Ph. Delsarte, An algebraic approach to the association schemes of coding theory, Phillips Res. Rep. Suppl. 10,1973."},{"key":"17_CR9","unstructured":"R.S. Rees, D.R. Stinson, Combinatorial Characterization of Authentication Codes II, personal communication."},{"issue":"No1","key":"17_CR10","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1137\/S0895480190178187","volume":"7","author":"C. Mitchell","year":"1994","unstructured":"C. Mitchell, M. Walker, P. Wild, The combinatorics of perfect authentication schemes, SIAM Journal of Discrete Mathematics, Vol 7, No 1, pp 102\u2013107, 1994.","journal-title":"SIAM Journal of Discrete Mathematics"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"M. De Soete, K. Vedder, M. Walker, Cartesian Authentication Schemes, Advances in Cryptology, proc. of Eurocrypt '89, Lecture Notes in Computer Science, vol 434, Springer Verlag 1990, pp 476\u2013490.","DOI":"10.1007\/3-540-46885-4_46"},{"key":"17_CR12","doi-asserted-by":"crossref","first-page":"128","DOI":"10.2307\/2983576","volume":"9","author":"C.R. Rao","year":"1947","unstructured":"C.R. Rao, Factorial experiments derivable from combinatorial arrangements of arrays, J. Roy. Statist. Soc. 9, 128\u2013139, 1947","journal-title":"J. Roy. Statist. Soc."},{"issue":"No1","key":"17_CR13","first-page":"11","volume":"24","author":"A. Davydov","year":"1988","unstructured":"A.Davydov, L.Tombak, Number of minimal-weight words in block codes, Problems of Information Transmission, Vol 24, No1, pp 11\u201324, 1988.","journal-title":"Problems of Information Transmission"},{"key":"17_CR14","unstructured":"H.C.A van Tilborg, Uniformly packed Codes, Thesis, Eindhoven University of Technology (1976)."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"J. Bierbrauer, K. Gopalakrishnan and D. R. Stinson, Bounds for resilient functions and orthogonal arrays, Advances in Cryptology \u2014 Crypto '94, Proceedings (Lecture Notes in Computer Science 839), pp 247\u2013256.","DOI":"10.1007\/3-540-48658-5_24"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T21:06:13Z","timestamp":1736024773000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000436"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/bfb0000436","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}