{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:25:40Z","timestamp":1761647140451,"version":"3.41.2"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"1-3","license":[{"start":{"date-parts":[[1999,12,1]],"date-time":"1999-12-01T00:00:00Z","timestamp":944006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1999,12,1]],"date-time":"1999-12-01T00:00:00Z","timestamp":944006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1999,12]]},"DOI":"10.1023\/a:1008329017752","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T09:41:38Z","timestamp":1040550098000},"page":"71-80","source":"Crossref","is-referenced-by-count":15,"title":["Antichain Codes"],"prefix":"10.1007","volume":"18","author":[{"given":"G\u00e9rard D.","family":"Cohen","sequence":"first","affiliation":[]},{"given":"Sylvia B.","family":"Encheva","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Z\u00e9mor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"240909_CR1","doi-asserted-by":"crossref","unstructured":"E. F. Assmus Jr., and J. D. Key, Designs and Their Codes, Cambridge University Press (1992).","DOI":"10.1017\/CBO9781316529836"},{"key":"240909_CR2","unstructured":"T. Beth, D. Jungnickel, and H. Lenz, Design Theory, BI Wissenschaftsverlag (1985)."},{"key":"240909_CR3","doi-asserted-by":"crossref","first-page":"1872","DOI":"10.1109\/18.340462","volume":"40","author":"G. D. Cohen","year":"1994","unstructured":"G. D. Cohen and G. Z\u00e9mor, Intersecting codes and independent families, IEEE Transactions on Information Theory, Vol. 40 (1994) pp. 1872-1881.","journal-title":"IEEE Transactions on Information Theory"},{"key":"240909_CR4","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1109\/18.272476","volume":"40","author":"S. Encheva","year":"1994","unstructured":"S. Encheva and T. Kl\u00f8ve, Codes satisfying the chain condition, IEEE Transactions on Information Theory, Vol. 40 (1994) pp. 175-180.","journal-title":"IEEE Transactions on Information Theory"},{"key":"240909_CR5","volume-title":"The Theory of Error-Correcting Codes","author":"F. J. MacWilliams","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North-Holland, Amsterdam (1977)."},{"key":"240909_CR6","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/TIT.1973.1054936","volume":"19","author":"J. L. Massey","year":"1973","unstructured":"J. L. Massey, D. J. Costello, Jr., and J. Justesen, Polynomial weights and code constructions, IEEE Transactions on Information Theory, Vol. 19 (1973) pp. 101-110.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"240909_CR7","first-page":"35","volume":"1","author":"V. N. Koshelev","year":"1965","unstructured":"V. N. Koshelev, On some properties of random group codes, Problems of Information Transmission, Vol. 1,No. 4 (1965) pp. 35-38.","journal-title":"Problems of Information Transmission"},{"key":"240909_CR8","first-page":"2137","volume":"63","author":"L. H. Ozarow","year":"1984","unstructured":"L. H. Ozarow and A. D. Wyner, Wire-tap channel II, AT&T Bell Labs. Techn. J., Vol. 63 (1984) pp. 2137-2157.","journal-title":"AT&T Bell Labs. Techn. J."},{"key":"240909_CR9","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1109\/TIT.1967.1054053","volume":"13","author":"J. N. Pierce","year":"1967","unstructured":"J. N. Pierce, Limit distribution of the minimum distance of random linear codes, IEEE Transactions on Information Theory, Vol. 13 (1967) pp. 595-599.","journal-title":"IEEE Transactions on Information Theory"},{"key":"240909_CR10","doi-asserted-by":"crossref","first-page":"1412","DOI":"10.1109\/18.133259","volume":"37","author":"V. K. Wei","year":"1991","unstructured":"V. K. Wei, Generalized Hamming weights for linear codes, IEEE Transactions on Information Theory, Vol. 37 (1991) pp. 1412-1418.","journal-title":"IEEE Transactions on Information Theory"},{"key":"240909_CR11","doi-asserted-by":"crossref","first-page":"1709","DOI":"10.1109\/18.259662","volume":"39","author":"V. K. Wei","year":"1993","unstructured":"V. K. Wei and K. Yang, On the generalized Hamming weights of product codes, IEEE Transactions on Information Theory, Vol. 39 (1993) pp. 1709-1713.","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008329017752.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008329017752\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008329017752.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:49:23Z","timestamp":1753760963000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008329017752"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,12]]},"references-count":11,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[1999,12]]}},"alternative-id":["240909"],"URL":"https:\/\/doi.org\/10.1023\/a:1008329017752","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[1999,12]]}}}