{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:37:09Z","timestamp":1775054229026,"version":"3.50.1"},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2006,6,1]],"date-time":"2006-06-01T00:00:00Z","timestamp":1149120000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2006,6]]},"DOI":"10.1007\/s10623-005-4982-8","type":"journal-article","created":{"date-parts":[[2006,4,17]],"date-time":"2006-04-17T13:52:29Z","timestamp":1145281949000},"page":"317-322","source":"Crossref","is-referenced-by-count":10,"title":["On Intersection Problem for Perfect Binary Codes"],"prefix":"10.1007","volume":"39","author":[{"given":"Sergey V.","family":"Avgustinovich","sequence":"first","affiliation":[]},{"given":"Olof","family":"Heden","sequence":"additional","affiliation":[]},{"given":"Faina I.","family":"Solov\u2019eva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4982_CR1","unstructured":"Avgustinovich SV, Heden O, Solov\u2019eva FI (2005). On intersections of perfect binary codes. to appear in the Proceedings of ALCOMA 05"},{"issue":"4","key":"4982_CR2","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/18.923749","volume":"47","author":"SV Avgustinovich","year":"2001","journal-title":"IEEE Trans Inform Theory"},{"issue":"2","key":"4982_CR3","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1137\/S0895480196309171","volume":"11","author":"T Etzion","year":"1998","journal-title":"SIAM J Discrete Math"},{"key":"4982_CR4","unstructured":"MacWilliams FJ, Sloane NJA (1977). The theory of error-correcting codes, Amsterdam North-Holland"},{"key":"4982_CR5","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1147\/rd.31.0025","volume":"3","author":"GS Shapiro","year":"1959","journal-title":"IBM J Res Develop"},{"key":"4982_CR6","unstructured":"Solov\u2019eva FI (2004). On perfect codes and related topics, Com2Mac Lecture Note Series 13, Pohang 2004"},{"key":"4982_CR7","first-page":"375","volume":"8","author":"YL Vasil\u2019ev","year":"1962","journal-title":"Problems Cybernet"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-005-4982-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-005-4982-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-005-4982-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:05Z","timestamp":1559245805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-005-4982-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,6]]}},"alternative-id":["4982"],"URL":"https:\/\/doi.org\/10.1007\/s10623-005-4982-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,6]]}}}