{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T15:30:39Z","timestamp":1772292639731,"version":"3.50.1"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,1,25]],"date-time":"2016-01-25T00:00:00Z","timestamp":1453680000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (CN)","doi-asserted-by":"publisher","award":["11301098"],"award-info":[{"award-number":["11301098"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004607","name":"Natural Science Foundation of Guangxi Province (CN)","doi-asserted-by":"publisher","award":["2013GXNSFCA019001"],"award-info":[{"award-number":["2013GXNSFCA019001"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangxi Higher Institutions' Program of Introducing 100 High-Level Overseas Talents"},{"name":"Guangxi \"Bagui Scholar\" Teams for Innovation and Research"},{"name":"Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing"},{"DOI":"10.13039\/501100004607","name":"Natural Science Foundation of Guangxi Province (CN)","doi-asserted-by":"publisher","award":["2014GXNSFDA118001"],"award-info":[{"award-number":["2014GXNSFDA118001"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s12095-016-0182-9","type":"journal-article","created":{"date-parts":[[2016,1,25]],"date-time":"2016-01-25T02:51:03Z","timestamp":1453690263000},"page":"397-405","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Asymptotically optimal 2 \u00af $\\overline {2}$ -separable codes with length 4"],"prefix":"10.1007","volume":"9","author":[{"given":"Minquan","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Jing","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xiaohu","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,25]]},"reference":[{"key":"182_CR1","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1137\/S0895480101384633","volume":"16","author":"SR Blackburn","year":"2003","unstructured":"Blackburn, S.R.: Frameproof codes. SIAM J. Discret. Math. 16, 499\u2013510 (2003)","journal-title":"SIAM J. Discret. Math."},{"key":"182_CR2","doi-asserted-by":"crossref","first-page":"5822","DOI":"10.1109\/TIT.2015.2473848","volume":"61","author":"SR Blackburn","year":"2015","unstructured":"Blackburn, S.R.: Probabilistic existence results for separable codes. IEEE Trans. Inf. Theory 61, 5822\u20135827 (2015)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"182_CR3","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44, 1897\u20131905 (1998)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"182_CR4","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s10623-013-9849-9","volume":"74","author":"M Cheng","year":"2015","unstructured":"Cheng, M., Fu, H.-L., Jiang, J., Lo, Y.-H., Miao, Y.: New bounds on 2 \u00af $\\overline 2$ -separable codes of length 2. Des. Codes Cryptogr. 74, 31\u201340 (2015)","journal-title":"Des. Codes Cryptogr."},{"key":"182_CR5","doi-asserted-by":"crossref","first-page":"1791","DOI":"10.1109\/TIT.2011.2174614","volume":"58","author":"M Cheng","year":"2012","unstructured":"Cheng, M., Ji, L., Miao, Y.: Separable codes. IEEE Trans. Inf. Theory 58, 1791\u20131803 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"182_CR6","doi-asserted-by":"crossref","first-page":"4843","DOI":"10.1109\/TIT.2011.2146130","volume":"57","author":"M Cheng","year":"2011","unstructured":"Cheng, M., Miao, Y.: On anti-collusion codes and detection algorithms for multimedia fingerprinting. IEEE Trans. Inf. Theory 57, 4843\u20134851 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"182_CR7","doi-asserted-by":"crossref","first-page":"5257","DOI":"10.1109\/TIT.2014.2331989","volume":"60","author":"F Gao","year":"2014","unstructured":"Gao, F., Ge, G.: New bounds on separable codes for multimedia fingerprinting. IEEE Trans. Inf. Theory 60, 5257\u20135262 (2014)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"182_CR8","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1006\/jcta.1997.2851","volume":"82","author":"HDL Hollmann","year":"1998","unstructured":"Hollmann, H.D.L., Lint, J.H., Linnartz, J.-P., Tolhuizen, L. M.G.M.: On codes with the identifiable parent property. J. Combin. Theory, Ser. A 82, 121\u2013133 (1998)","journal-title":"J. Combin. Theory, Ser. A"},{"key":"182_CR9","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.1109\/18.915661","volume":"47","author":"JN Staddon","year":"2001","unstructured":"Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inf. Theory 47, 1042\u20131049 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"182_CR10","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/S0378-3758(99)00131-7","volume":"86","author":"DR Stinson","year":"2000","unstructured":"Stinson, D.R., van Trung, T., Wei, R.: Secure frameproof codes, key distribution pattern, group testing algorithms and related structures. J. Stat. Plan. Inference 86, 595\u2013617 (2000)","journal-title":"J. Stat. Plan. Inference"},{"key":"182_CR11","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1109\/TSP.2003.809378","volume":"51","author":"W Trappe","year":"2003","unstructured":"Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process 51, 1069\u20131087 (2003)","journal-title":"IEEE Trans. Signal Process"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0182-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-016-0182-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0182-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0182-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T23:54:05Z","timestamp":1559433245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-016-0182-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,25]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["182"],"URL":"https:\/\/doi.org\/10.1007\/s12095-016-0182-9","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,25]]}}}