{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T23:24:49Z","timestamp":1648509889528},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,9,12]],"date-time":"2014-09-12T00:00:00Z","timestamp":1410480000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s12095-014-0107-4","type":"journal-article","created":{"date-parts":[[2014,9,11]],"date-time":"2014-09-11T07:54:25Z","timestamp":1410422065000},"page":"207-215","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A construction of t-fold perfect splitting authentication codes with equal deception probabilities"],"prefix":"10.1007","volume":"7","author":[{"given":"Mingchao","family":"Li","sequence":"first","affiliation":[]},{"given":"Miao","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Beiliang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,12]]},"reference":[{"key":"107_CR1","doi-asserted-by":"crossref","unstructured":"Abel, R.J.R.: Existence of five MOLS of order 18 and 60. J. Combin. Designs. doi: 10.1002\/jcd.21384","DOI":"10.1002\/jcd.21384"},{"key":"107_CR2","first-page":"160","volume-title":"Mutually Orthogonal Latin Squares (MOLS). In: Colbourn, C.J., Dinitz, J.H., Dinitz, J.H. (eds.) The CRC Handbook","author":"RJR Abel","year":"2007","unstructured":"Abel, R.J.R., Colbourn, C.J., Dinitz, J.H.: Mutually Orthogonal Latin Squares (MOLS). In: Colbourn, C.J., Dinitz, J.H., Dinitz, J.H. (eds.) The CRC Handbook, pp. 160\u2013192. CRC Press, Boca Raton (2007)"},{"key":"107_CR3","first-page":"141","volume":"43","author":"EF Brickell","year":"1984","unstructured":"Brickell, E.F.: A few results in message authentication. Congr. Numer. 43, 141\u2013154 (1984)","journal-title":"Congr. Numer."},{"key":"107_CR4","first-page":"23","volume":"293\u2013295","author":"KA Bush","year":"1952","unstructured":"Bush, K.A.: Orthogonal arrays of index unity. Ann. Math. Stat. 23, 293\u2013295 (1952)","journal-title":"Ann. Math. Stat."},{"key":"107_CR5","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3934\/amc.2011.5.59","volume":"5","author":"YM Chee","year":"2011","unstructured":"Chee, Y.M., Zhang, X., Zhang, H.: Infinite families of optimal authentication codes secure against spoofing attacks of highter order. Adv. Math. Commun. 5, 59\u201368 (2011)","journal-title":"Adv. Math. Commun."},{"key":"107_CR6","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s12095-010-0020-4","volume":"2","author":"M Huber","year":"2010","unstructured":"Huber, M.: Combinatorial bounds and characterizations of splitting authentication codes. Crypt. Commun. 2, 173\u2013185 (2010)","journal-title":"Crypt. Commun."},{"key":"107_CR7","first-page":"23","volume":"117","author":"L Ji","year":"2010","unstructured":"Ji, L., Yin, J.: Constructions of new orthogonal arrays and covering arrays of strength three. J. Combin. Theory, Ser. A 117, 23\u201333 (2010)","journal-title":"J. Combin. Theory, Ser. A"},{"key":"107_CR8","unstructured":"Liang, M.: Combinatorial Constructions for Authentication Codes. PhD thesis, Suzhou University (2012)"},{"key":"107_CR9","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s10623-010-9433-5","volume":"60","author":"M Liang","year":"2011","unstructured":"Liang, M., Du, B.A: new class of splitting 3-designs. Des. Codes Crypt. 60, 283\u2013290 (2011)","journal-title":"Des. Codes Crypt."},{"key":"107_CR10","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s10623-011-9496-y","volume":"62","author":"M Liang","year":"2012","unstructured":"Liang, M., Du, B.A: new class of 3-fold perfect splitting authentication codes. Des. Codes Crypt. 62, 109\u2013119 (2012)","journal-title":"Des. Codes Crypt."},{"key":"107_CR11","first-page":"129","volume":"79","author":"WH Mills","year":"1990","unstructured":"Mills, W.H.: On the existence of H designs. Congr. Numer. 79, 129\u2013141 (1990)","journal-title":"Congr. Numer."},{"key":"107_CR12","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/BF00191354","volume":"8","author":"D Pei","year":"1995","unstructured":"Pei, D.: Information-theoretic bounds for authentication codes and block designs. J. Crypt. 8, 177\u2013188 (1995)","journal-title":"J. Crypt."},{"key":"107_CR13","doi-asserted-by":"crossref","DOI":"10.1201\/9781420003185","volume-title":"Authentication Codes and Combinatorial Designs","author":"D Pei","year":"2006","unstructured":"Pei, D.: Authentication Codes and Combinatorial Designs. ChapmanHall\/CRC, Boca Raton (2006)"},{"key":"107_CR14","first-page":"413","volume":"34","author":"GJ Simmons","year":"1982","unstructured":"Simmons, G.J.: A game theory model of digital message authentication. Congr. Numer. 34, 413\u2013424 (1982)","journal-title":"Congr. Numer."},{"key":"107_CR15","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1002\/jcd.21298","volume":"22","author":"DT Todorov","year":"2012","unstructured":"Todorov, D.T.: Four Mutually Orthogonal Latin Squares of order 14. J. Combin. Designs 22, 363\u2013364 (2012)","journal-title":"J. Combin. Designs"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0107-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-014-0107-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0107-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T08:28:40Z","timestamp":1598257720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-014-0107-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,12]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["107"],"URL":"https:\/\/doi.org\/10.1007\/s12095-014-0107-4","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,12]]}}}