{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T14:46:00Z","timestamp":1649169960554},"reference-count":24,"publisher":"Elsevier BV","issue":"1-3","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,8,22]],"date-time":"2013-08-22T00:00:00Z","timestamp":1377129600000},"content-version":"vor","delay-in-days":3461,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Discrete Mathematics"],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1016\/s0012-365x(03)00265-6","type":"journal-article","created":{"date-parts":[[2003,10,11]],"date-time":"2003-10-11T06:39:10Z","timestamp":1065854350000},"page":"153-161","source":"Crossref","is-referenced-by-count":1,"title":["Existence of APAV(q,k) with q a prime power \u22615(mod8) and k\u22611(mod4)"],"prefix":"10.1016","volume":"279","author":[{"given":"Kejun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Zhenfu","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Dianhua","family":"Wu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0012-365X(03)00265-6_BIB1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0012-365X(00)00357-5","article-title":"Existence of Steiner seven-cycle systems","volume":"252","author":"Abel","year":"2002","journal-title":"Discrete Math."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB2","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/0012-365X(94)00186-M","article-title":"An existence theorem for cyclic triplewhist tournaments","volume":"138","author":"Anderson","year":"1995","journal-title":"Discrete Math."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB3","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1002\/jcd.3180020603","article-title":"Theory of perpendicular arrays","volume":"2","author":"Bierbrauer","year":"1994","journal-title":"J. Combin. Des."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB4","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/S0378-3758(00)00284-6","article-title":"V(m,t) and its variants","volume":"95","author":"Chen","year":"2001","journal-title":"J. Statist. Plann. Inference"},{"key":"10.1016\/S0012-365X(03)00265-6_BIB5","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1002\/jcd.998","article-title":"Existence of (q,7,1) difference families with q a prime power","volume":"10","author":"Chen","year":"2002","journal-title":"J. Combin. Des."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB6","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1023\/A:1008311600271","article-title":"Existence of (q,6,1) difference family with q a prime power","volume":"15","author":"Chen","year":"1998","journal-title":"Designs, Codes Cryptogr."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB7","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1002\/(SICI)1520-6610(1999)7:1<57::AID-JCD7>3.0.CO;2-4","article-title":"Existence of APAV(q,k) with q a prime power \u2261 3(mod4) and k odd >1","volume":"7","author":"Chen","year":"1999","journal-title":"J. Combin. Des."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB8","doi-asserted-by":"crossref","unstructured":"G. Ge, Authentication perpendicular arrays and related designs, Ph.D. Thesis, Suzhou University, 1996.","DOI":"10.1002\/(SICI)1520-6610(1996)4:5<365::AID-JCD5>3.0.CO;2-D"},{"key":"10.1016\/S0012-365X(03)00265-6_BIB9","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1002\/(SICI)1520-6610(1996)4:5<365::AID-JCD5>3.0.CO;2-D","article-title":"Authentication perpendicular arrays APA1(2,5,v)","volume":"4","author":"Ge","year":"1996","journal-title":"J. Combin. Des."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB10","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1002\/(SICI)1520-6610(1997)5:2<111::AID-JCD3>3.0.CO;2-I","article-title":"Authentication perpendicular arrays APA1(2,7,v)","volume":"5","author":"Ge","year":"1997","journal-title":"J. Combin. Des."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB11","first-page":"163","article-title":"Nested Steiner n-cycle systems and perpendicular arrays","volume":"3","author":"Granville","year":"1988","journal-title":"J. Combin. Math. Combin. Comput."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB12","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1016\/0097-3165(75)90051-5","article-title":"On the maximal number of pairwise orthoSteiner triple systems","volume":"19","author":"Gross","year":"1975","journal-title":"J. Combin. Theory Ser. A"},{"key":"10.1016\/S0012-365X(03)00265-6_BIB13","first-page":"215","article-title":"On perpendicular arrays with t\u2a7e 3","volume":"28","author":"Kramer","year":"1989","journal-title":"Ars Combin."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB14","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1006\/jcta.1998.2924","article-title":"On cyclically resolvable cyclic Steiner 2-designs","volume":"85","author":"Lam","year":"1999","journal-title":"J. Combin. Theory Ser. A"},{"key":"10.1016\/S0012-365X(03)00265-6_BIB15","unstructured":"R. Lidl, H. Niederreiter, Finite fields, Encyclopedia of Mathematics and its Applications, Vol. 20, Cambridge University Press, Cambridge, 1983."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB16","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/0012-365X(84)90104-3","article-title":"Stenier pentagon systems","volume":"52","author":"Lindner","year":"1984","journal-title":"Discrete Math."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB17","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1016\/S0378-3758(99)00127-5","article-title":"V(m,t)'s for m=4, 5, 6","volume":"86","author":"Ling","year":"2000","journal-title":"J. Statist. Plann. Inference"},{"key":"10.1016\/S0012-365X(03)00265-6_BIB18","first-page":"191","article-title":"Cohen's sieve with quadratic conditions","volume":"49","author":"McNay","year":"1996","journal-title":"Utilitas Math."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB19","first-page":"141","article-title":"On the construction of perpendicular arrays","volume":"18","author":"Mullin","year":"1980","journal-title":"Utilitas Math."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB20","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/BF02351720","article-title":"A construction for authentication\/secrecy codes from certain combinatorial designs","volume":"1","author":"Stinson","year":"1988","journal-title":"J. Cryptology"},{"key":"10.1016\/S0012-365X(03)00265-6_BIB21","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/BF00206324","article-title":"Some constructions and bounds for authentication codes","volume":"1","author":"Stinson","year":"1988","journal-title":"J. Cryptology"},{"key":"10.1016\/S0012-365X(03)00265-6_BIB22","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/BF02252868","article-title":"The combinatorics of authentication and secrecy codes","volume":"2","author":"Stinson","year":"1990","journal-title":"J. Cryptology"},{"key":"10.1016\/S0012-365X(03)00265-6_BIB23","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/S0195-6698(13)80058-3","article-title":"A construction for authentication\/secrecy codes from 3-homogeneous permutation groups","volume":"11","author":"Stinson","year":"1990","journal-title":"European J. Combin."},{"key":"10.1016\/S0012-365X(03)00265-6_BIB24","doi-asserted-by":"crossref","unstructured":"T. Sz\u00f6nyi, Some applications of algebraic curves in finite geometry and combinatorics, London Mathematical Society Lecture Notes Series, Vol. 241, Cambridge University Press, 1997, pp. 197\u2013236.","DOI":"10.1017\/CBO9780511662119.008"}],"container-title":["Discrete Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0012365X03002656?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0012365X03002656?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T01:09:26Z","timestamp":1585184966000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0012365X03002656"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":24,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[2004,3]]}},"alternative-id":["S0012365X03002656"],"URL":"https:\/\/doi.org\/10.1016\/s0012-365x(03)00265-6","relation":{},"ISSN":["0012-365X"],"issn-type":[{"value":"0012-365X","type":"print"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}