{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T20:53:35Z","timestamp":1648587215463},"reference-count":7,"publisher":"Elsevier BV","issue":"1-3","license":[{"start":{"date-parts":[[1994,2,1]],"date-time":"1994-02-01T00:00:00Z","timestamp":760060800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":7106,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Discrete Mathematics"],"published-print":{"date-parts":[[1994,2]]},"DOI":"10.1016\/0012-365x(94)90144-9","type":"journal-article","created":{"date-parts":[[2002,10,10]],"date-time":"2002-10-10T19:41:28Z","timestamp":1034278888000},"page":"63-66","source":"Crossref","is-referenced-by-count":1,"title":["A family of perpendicular arrays achieving perfect 4-fold secrecy"],"prefix":"10.1016","volume":"125","author":[{"given":"J\u00fcrgen","family":"Bierbrauer","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0012-365X(94)90144-9_BIB1","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/S0021-9800(69)80096-7","article-title":"An infinite class of 4-designs","volume":"6","author":"Alltop","year":"1969","journal-title":"J. Combin. Theory"},{"key":"10.1016\/0012-365X(94)90144-9_BIB2","doi-asserted-by":"crossref","unstructured":"J. Bierbrauer, A new family of 4-designs, Discrete Math., to appear.","DOI":"10.1007\/BF01793006"},{"key":"10.1016\/0012-365X(94)90144-9_BIB3","doi-asserted-by":"crossref","unstructured":"J. Bierbrauer, A family of 4-designs with block-size 9, Discrete Math., submitted.","DOI":"10.1016\/0012-365X(94)00192-L"},{"key":"10.1016\/0012-365X(94)90144-9_BIB4","series-title":"Research Report CORR 85-24","article-title":"Hyperfactorizations of graphs and 5-designs","author":"Jungnickel","year":"1985"},{"key":"10.1016\/0012-365X(94)90144-9_BIB5","first-page":"215","article-title":"On perpendicular arrays with t\u2a7e3","volume":"28","author":"Kramer","year":"1989","journal-title":"Ars Combin."},{"key":"10.1016\/0012-365X(94)90144-9_BIB6","unstructured":"E.S. Kramer, S. Magliveras, T. van Trung and Q. Wu, Some perpendicular arrays for arbitrarily large t, manuscript."},{"key":"10.1016\/0012-365X(94)90144-9_BIB7","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/BF02252868","article-title":"The combinatorics of authentication and secrecy codes","volume":"2","author":"Stinson","year":"1990","journal-title":"J. Cryptology"}],"container-title":["Discrete Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0012365X94901449?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0012365X94901449?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T07:55:35Z","timestamp":1554969335000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0012365X94901449"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,2]]},"references-count":7,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[1994,2]]}},"alternative-id":["0012365X94901449"],"URL":"https:\/\/doi.org\/10.1016\/0012-365x(94)90144-9","relation":{},"ISSN":["0012-365X"],"issn-type":[{"value":"0012-365X","type":"print"}],"subject":[],"published":{"date-parts":[[1994,2]]}}}