{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:05:00Z","timestamp":1772042700793,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,5,3]],"date-time":"2013-05-03T00:00:00Z","timestamp":1367539200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s10623-013-9826-3","type":"journal-article","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T09:55:46Z","timestamp":1367488546000},"page":"781-790","source":"Crossref","is-referenced-by-count":4,"title":["A construction for t-fold perfect authentication codes with arbitration"],"prefix":"10.1007","volume":"73","author":[{"given":"Miao","family":"Liang","sequence":"first","affiliation":[]},{"given":"Mingchao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Beiliang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,3]]},"reference":[{"key":"9826_CR1","doi-asserted-by":"crossref","unstructured":"Bush K.A.: Orthogonal arrays of index unity. Ann. Math. Stat. 23, 293\u2013295 (1952).","DOI":"10.1214\/aoms\/1177729449"},{"key":"9826_CR2","unstructured":"Chee Y.M., Zhang X., Zhang H.: Infinite families of optimal authentication codes secure against spoofing attacks of highter order. Adv. Math. Commun. 5, 59\u201368 (2011)."},{"key":"9826_CR3","doi-asserted-by":"crossref","unstructured":"Colbourn C.J., Dinitz J.H.: The CRC Handbook of Combinatorial Design. Chapman Hall\/CRC, Boca Raton (2007).","DOI":"10.1201\/9781420010541"},{"key":"9826_CR4","unstructured":"Hanani H., Ray-Chaudhuri D.K., Wilson R.M.: On resolvable designs. Discret. Math. 3, 343\u2013357 (1972)."},{"key":"9826_CR5","unstructured":"Huber M.: Combinatorial bounds and characterizations of splitting authentication codes. Cryptogr. Commun. 2, 173\u2013185 (2010)."},{"key":"9826_CR6","unstructured":"Ji L., Yin J.: Constructions of new orthogonal arrays and covering arrays of strength three. J. Comb. Theory A 117, 23\u201333 (2010)."},{"key":"9826_CR7","unstructured":"Johansson T.: Lower bounds on the probability of deception in authentication with arbitration. IEEE Trans. Inf. Theory 40, 1573\u20131585 (1994)."},{"key":"9826_CR8","doi-asserted-by":"crossref","unstructured":"Liang M., Du B.: A new class of splitting 3-designs. Des. Codes Cryptogr. 60, 283\u2013290 (2011).","DOI":"10.1007\/s10623-010-9433-5"},{"key":"9826_CR9","doi-asserted-by":"crossref","unstructured":"Liang M., Du B.: A new class of 3-fold perfect splitting authentication codes. Des. Codes Cryptogr. 62, 109\u2013119 (2012).","DOI":"10.1007\/s10623-011-9496-y"},{"key":"9826_CR10","unstructured":"Mills W.H.: On the existence of H designs. Congr. Numer. 79, 129\u2013141 (1990)."},{"key":"9826_CR11","doi-asserted-by":"crossref","unstructured":"Pei D.: Information-theoretic bounds for authentication codes and block designs. J. Cryptol. 8, 177\u2013188 (1995).","DOI":"10.1007\/BF00191354"},{"key":"9826_CR12","doi-asserted-by":"crossref","unstructured":"Pei D.: Authentication Codes and Combinatorial Designs. Chapman Hall\/CRC, Boca Raton (2006).","DOI":"10.1201\/9781420003185"},{"key":"9826_CR13","unstructured":"Pei D.: Message Authentication Codes (in Chinese). USCT, Hefei (2009)."},{"key":"9826_CR14","unstructured":"Pei D., Li Y., Wang Y., Safavi-Naini R.: Characterization of Authentication Codes with Arbitration. Lecture Notes in Computer Science, vol. 1587, pp. 303\u2013313. Springer, New York (1999)."},{"key":"9826_CR15","unstructured":"Seiden E.: A method of construction of resolvable BIBD. Sankhya A 25, 393\u2013394 (1963)."},{"key":"9826_CR16","unstructured":"Simmons G.J.: A game theory model of digital message authentication. Congr. Numer. 34, 413\u2013424 (1982)."},{"key":"9826_CR17","unstructured":"Simmons G.J.: Message authentication with arbitration of transmitter\/receiver disputes. In: Blakley G.R., Chaum D. (eds.) Advances in Cryptology-EUROCRYPT 1987. Lecture Notes in Computer Science, vol. 304, pp. 151\u2013165. Springer, Berlin (1988)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9826-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-013-9826-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9826-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,26]],"date-time":"2020-07-26T05:27:08Z","timestamp":1595741228000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-013-9826-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,3]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["9826"],"URL":"https:\/\/doi.org\/10.1007\/s10623-013-9826-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,3]]}}}