{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T14:10:16Z","timestamp":1778249416699,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540602163","type":"print"},{"value":"9783540447337","type":"electronic"}],"license":[{"start":{"date-parts":[[1995,1,1]],"date-time":"1995-01-01T00:00:00Z","timestamp":788918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1995,1,1]],"date-time":"1995-01-01T00:00:00Z","timestamp":788918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0030844","type":"book-chapter","created":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T03:51:40Z","timestamp":1133409100000},"page":"292-302","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["New bound for affine resolvable designs and its application to authentication codes"],"prefix":"10.1007","author":[{"given":"Kaoru","family":"Kurosawa","sequence":"first","affiliation":[]},{"given":"Sanpei","family":"Kageyama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,20]]},"reference":[{"key":"31_CR1","first-page":"105","volume":"6","author":"R.C. Bose","year":"1942","unstructured":"R.C.Bose, \u201cA note on the resolvability of balanced incomplete block designs\u201d, Sankhy\u0101, 6, 105\u2013110. (1942)","journal-title":"Sankhy\u0101"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"S.S.Shrikhande and D.Raghavarao, \u201cAffine \u03b1-resolvable incomplete block designs\u201d, Contributions to Statistics. Presented to Prof. P.C.Mahalanobis on the occasion of his 70th birthday. Pergamon Press, pp.471\u2013480. (1963)","DOI":"10.1016\/B978-1-4832-3160-0.50034-8"},{"key":"31_CR3","unstructured":"D.Raghavarao, \u201cConstructions and combinatorial problems in design of experiments\u201d, John Wiley & Sons, Inc. (1971)."},{"key":"31_CR4","first-page":"195","volume":"1","author":"S. Kageyama","year":"1973","unstructured":"S.Kageyama, \u201cOn \u03bc-resolvable balanced incomplete block designs\u201d, Ann. Statist. 1, 195\u2013203. (1973)","journal-title":"Ann. Statist."},{"key":"31_CR5","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1214\/aos\/1176343475","volume":"4","author":"S. Kageyama","year":"1976","unstructured":"S.Kageyama, \u201cResolvability of block designs\u201d, Ann. Statist. 4, 655\u201361. (1976)","journal-title":"Ann. Statist."},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/BF00148147","volume":"5","author":"D.R. Hughes","year":"1976","unstructured":"D.R.Hughes & F.C.Piper, \u201cOn resolutions and Bose's theorem\u201d, Geom. Dedicata 5, 129\u201333. (1976)","journal-title":"Geom. Dedicata"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/BF00147652","volume":"15","author":"S. Kageyama","year":"1984","unstructured":"S.Kageyama, \u201cSome properties on resolvability of variance-balanced designs\u201d, Geom. Dedicata 15, 289\u201392. (1984)","journal-title":"Geom. Dedicata"},{"issue":"1","key":"31_CR8","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1093\/biomet\/72.1.165","volume":"72","author":"R. Mukerjee","year":"1985","unstructured":"R.Mukerjee & S. Kageyama, \u201cOn resolvable and affine resolvable variance balanced designs\u201d, Biometrika, 72, 1, pp.165\u2013172. (1985)","journal-title":"Biometrika"},{"key":"31_CR9","unstructured":"G.J.Simmons, \u201cMessage Authentication with Arbitration of Transmitter\/Receiver Disputes\u201d, Proceedings of Eurocrypt'87, Lecture Notes in Computer Science, LNCS 304, Springer Verlag, pp.150\u201316 (1987)"},{"issue":"no.2","key":"31_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF00204449","volume":"2","author":"G.J. Simmons","year":"1990","unstructured":"G.J.Simmons, \u201cA Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration\u201d, Journal of Cryptology, Vol.2, no.2, 1990, pp.77\u2013104 (1990).","journal-title":"Journal of Cryptology"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"T.Johansson, \u201cLower Bounds on the Probability of Deception in Authentication with Arbitration\u201d, In Proceedings of 1993 IEEE International Symposium on Information Theory, San Antonio, USA, January 17\u201322, pp.231. (1993)","DOI":"10.1109\/ISIT.1993.748545"},{"issue":"No.5","key":"31_CR12","doi-asserted-by":"crossref","first-page":"1573","DOI":"10.1109\/18.333869","volume":"40","author":"T. Johansson","year":"1994","unstructured":"T.Johansson, \u201cLower Bounds on the Probability of Deception in Authentication with Arbitration\u201d, IEEE Trans. on IT, vol.40, No.5, pp.1573\u20131585 (1994)","journal-title":"IEEE Trans. on IT"},{"key":"31_CR13","unstructured":"T.Johansson, \u201cOn the construction of perfect authentication codes that permit arbitration\u201d, Proceedings of Crypto'93, Lecture Notes in Computer Science, LNCS 773, Springer Verlag, pp.341\u2013354 (1993)."},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"K.Kurosawa, \u201cNew bound on authentication code with arbitration\u201d, Proceedings of Crypto'94, Lecture Notes in Computer Science, LNCS 899, Springer Verlag, pp.140\u2013149. (1994)","DOI":"10.1007\/3-540-48658-5_16"},{"key":"31_CR15","unstructured":"K.Kurosawa and S.Obana, \u201cCombinatorial Bounds for Authentication Codes with Arbitration\u201d, Eurocrypt'95 (to be presented)"},{"key":"31_CR16","volume-title":"Contemporary Cryptology, The science of information integrity","author":"G.J. Simmons","year":"1992","unstructured":"G.J.Simmons, \u201cA survey of Information Authentication\u201d, in Contemporary Cryptology, The science of information integrity, ed. G.J.Simmons, IEEE Press, New York, (1992)."},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"G.J.Simmons, \u201cAuthentication theory\/coding theory\u201d, Proceedings of Crypto'84, Lecture Notes in Computer Science, LNCS 196, Springer Verlag, pp.411\u2013431 (1985).","DOI":"10.1007\/3-540-39568-7_32"}],"container-title":["Lecture Notes in Computer Science","Computing and Combinatorics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0030844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T13:14:12Z","timestamp":1778246052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BFb0030844"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602163","9783540447337"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/bfb0030844","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995]]},"assertion":[{"value":"20 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}