{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T19:37:52Z","timestamp":1770061072845,"version":"3.49.0"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2006,4,1]],"date-time":"2006-04-01T00:00:00Z","timestamp":1143849600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2006,4]]},"DOI":"10.1007\/s10623-005-2542-x","type":"journal-article","created":{"date-parts":[[2006,2,15]],"date-time":"2006-02-15T07:46:39Z","timestamp":1139989599000},"page":"65-80","source":"Crossref","is-referenced-by-count":10,"title":["Codes Over the p-adic Integers"],"prefix":"10.1007","volume":"39","author":[{"given":"Steven T.","family":"Dougherty","sequence":"first","affiliation":[]},{"given":"Young Ho","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2542_CR1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/BF01390768","volume":"6","author":"A. R. Calderbank","year":"1995","journal-title":"Designs, Codes and Cryptography"},{"key":"2542_CR2","doi-asserted-by":"crossref","first-page":"253","DOI":"10.14492\/hokmj\/1351001213","volume":"28","author":"S. T. Dougherty","year":"1999","journal-title":"Hokkaido Math. J."},{"key":"2542_CR3","doi-asserted-by":"crossref","unstructured":"S. T. Dougherty, S. Y. Kim and Y. H. Park, Lifted Codes and their Weight Enumerators, Discrete mathematics, to appear.","DOI":"10.1016\/j.disc.2005.08.004"},{"issue":"1","key":"2542_CR4","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1109\/18.817524","volume":"46","author":"S. T. Dougherty","year":"2000","journal-title":"IEEE Transactions on Information Theory"},{"key":"2542_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-22278-2","volume-title":"P-adic Numbers: An Introduction","author":"F. Q. Gouv\u00eaa","year":"1993"},{"key":"2542_CR6","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/18.312154","volume":"IT-40","author":"A. R. Hammons Jr.","year":"1994","journal-title":"IEEE Trans. Inform. Theory"},{"key":"2542_CR7","volume-title":"Introduction to the Theory of Error-Correcting Codes","author":"V. Pless","year":"1989","edition":"2"},{"key":"2542_CR8","first-page":"177","volume-title":"the Handbook of Coding Theory","author":"E. Rains","year":"1998"},{"key":"2542_CR9","first-page":"329","volume-title":"Coding Theory and Applications","author":"P. Sol\u00e9","year":"1988"},{"key":"2542_CR10","volume-title":"Finite Rings with identity","author":"B. R. McDonald","year":"1974"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-005-2542-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-005-2542-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-005-2542-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:05Z","timestamp":1559245805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-005-2542-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,4]]}},"alternative-id":["2542"],"URL":"https:\/\/doi.org\/10.1007\/s10623-005-2542-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,4]]}}}