{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:57Z","timestamp":1740148917830,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,8,31]],"date-time":"2016-08-31T00:00:00Z","timestamp":1472601600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["203114-11"],"award-info":[{"award-number":["203114-11"]}],"id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s12095-016-0202-9","type":"journal-article","created":{"date-parts":[[2016,8,31]],"date-time":"2016-08-31T03:08:42Z","timestamp":1472612922000},"page":"581-597","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Localised multisecret sharing"],"prefix":"10.1007","volume":"9","author":[{"given":"Thalia M.","family":"Laing","sequence":"first","affiliation":[]},{"given":"Keith M.","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Maura B.","family":"Paterson","sequence":"additional","affiliation":[]},{"given":"Douglas R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,31]]},"reference":[{"key":"202_CR1","doi-asserted-by":"crossref","unstructured":"Abughazalah, S., Markantonakis, K., Mayes, K.: Enhancing the key distribution model in the RFID-enabled supply chains. In: 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA 2014), pp. 871\u2013878 (2014)","DOI":"10.1109\/WAINA.2014.135"},{"key":"202_CR2","first-page":"313","volume":"48","author":"GR Blakley","year":"1979","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. Federal Inf. Process. Standard Conference Proceedings 48, 313\u2013317 (1979)","journal-title":"Federal Inf. Process. Standard Conference Proceedings"},{"key":"202_CR3","doi-asserted-by":"crossref","unstructured":"Blundo, C., Santis, A.D., Crescenzo, G.D., Gaggia, A.G., Vaccaro, U.: Multi-secret sharing schemes. In: Desmedt, Y. (ed.) CRYPTO \u201994, volume 839 of LNCS, pp. 150\u2013163. Springer (1994)","DOI":"10.1007\/3-540-48658-5_17"},{"key":"202_CR4","doi-asserted-by":"crossref","unstructured":"Blundo, C., Santis, A.D., Vaccaro, U.: Efficient sharing of many secrets. In: Enjalbert, P., Finkel, A., Wagner, K.W. (eds.) STACS \u201993, volume 665 of LNCS, pp. 692\u2013703. Springer (1993)","DOI":"10.1007\/3-540-56503-5_68"},{"key":"202_CR5","doi-asserted-by":"crossref","unstructured":"Capocelli, R.M., Santis, A.D., Gargano, L., Vaccaro, U.: On the size of shares for secret sharing schemes. In: Feigenbaum, J. (ed.) CRYPTO \u201991, volume 576 of LNCS, pp. 101\u2013113. Springer (1991)","DOI":"10.1007\/3-540-46766-1_7"},{"key":"202_CR6","unstructured":"EPCglobal: Radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 mhz\u2013960 mhz version 1.0. 9. http:\/\/www.epcglobalinc.org (2004)"},{"issue":"3","key":"202_CR7","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1007\/s10623-013-9831-6","volume":"73","author":"J Herranz","year":"2013","unstructured":"Herranz, J., Ruiz, A., S\u00e1ez, G.: New results and applications for multi-secret sharing schemes. Des. Codes Crypt. 73(3), 841\u2013864 (2013)","journal-title":"Des. Codes Crypt."},{"key":"202_CR8","unstructured":"Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. In: IEEE Globecom, pp. 99\u2013102 (1987)"},{"key":"202_CR9","doi-asserted-by":"crossref","unstructured":"Jackson, W.-A., Martin, K.M., O\u2019Keefe, C.M.: Multisecret threshold schemes. In: Stinson, D.R. (ed.) CRYPTO \u201993, volume 773 of LNCS, pp. 126\u2013135. Springer (1993)","DOI":"10.1007\/3-540-48329-2_11"},{"key":"202_CR10","unstructured":"Juels, A., Pappu, R., Parno, B.: Unidirectional key distribution across time and space with applications to RFID security. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 75\u201390. USENIX Association (2008)"},{"key":"202_CR11","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: Secret sharing made short. In: Stinson, D.R. (ed.) CRYPTO \u201993, volume 773 of LNCS, pp. 136\u2013146. Springer (1993)","DOI":"10.1007\/3-540-48329-2_12"},{"key":"202_CR12","first-page":"51","volume":"14","author":"K Martin","year":"1996","unstructured":"Martin, K., Jackson, W.-A.: A combinatorial interpretation of ramp schemes. Aust. J. Commun. 14, 51\u201360 (1996)","journal-title":"Aust. J. Commun."},{"key":"202_CR13","unstructured":"Massey, J.: Minimal codewords and secret sharing. In: Proceedings 6th Joint Swedish-Russian International Workshop on InformationTheory, pp. 276\u2013279 (1993)"},{"issue":"1","key":"202_CR14","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10623-005-2761-1","volume":"39","author":"B Masucci","year":"2006","unstructured":"Masucci, B.: Sharing multiple secrets: models, schemes and analysis. Des. Codes Crypt. 39(1), 89\u2013111 (2006)","journal-title":"Des. Codes Crypt."},{"issue":"9","key":"202_CR15","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1145\/358746.358762","volume":"24","author":"RJ McEliece","year":"1981","unstructured":"McEliece, R.J., Sarwate, D.V.: On sharing secrets and R,eed-Solomon codes. Commun. ACM 24(9), 583\u2013584 (1981)","journal-title":"Commun. ACM"},{"issue":"4","key":"202_CR16","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s12095-013-0082-1","volume":"5","author":"MB Paterson","year":"2013","unstructured":"Paterson, M.B., Stinson, D.R.: A simple combinatorial treatment of constructions and threshold gaps of ramp schemes. Cryptogr. Commun. 5(4), 229\u2013240 (2013)","journal-title":"Cryptogr. Commun."},{"issue":"1","key":"202_CR17","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2005.12.003","volume":"25","author":"CM Roberts","year":"2006","unstructured":"Roberts, C.M.: Radio frequency identification (RFID). Comput. Secur. 25(1), 18\u201326 (2006)","journal-title":"Comput. Secur."},{"issue":"11","key":"202_CR18","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0202-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-016-0202-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0202-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0202-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T23:01:54Z","timestamp":1568329314000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-016-0202-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,31]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["202"],"URL":"https:\/\/doi.org\/10.1007\/s12095-016-0202-9","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2016,8,31]]}}}