{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T22:22:43Z","timestamp":1774477363707,"version":"3.50.1"},"reference-count":15,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2017,1,2]]},"DOI":"10.1080\/00207160.2015.1091071","type":"journal-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T16:21:43Z","timestamp":1442938903000},"page":"107-114","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["Multisecret-sharing schemes and bounded distance decoding of linear codes"],"prefix":"10.1080","volume":"94","author":[{"given":"Selda","family":"\u00c7alkavur","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Sol\u00e9","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,10,16]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055873"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46885-4_45"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00207-3"},{"issue":"9","key":"CIT0005","first-page":"1023","volume":"3","author":"Ding C.","year":"1997","journal-title":"J. Comput. Sci."},{"key":"CIT0006","volume-title":"A First Course in Coding Theory","author":"Hill R.","year":"1986"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1007\/BF00189262"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056621"},{"key":"CIT0009","volume-title":"The Theory of Error Correcting Codes","author":"MacWilliams F.J.","year":"1977"},{"key":"CIT0011","first-page":"583","volume":"24","author":"McEliece R.J.","year":"1981","journal-title":"Commun. Assoc. Comp. Mach."},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1109\/18.841188"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36552-4_18"},{"key":"CIT0015","volume-title":"Coding and Information Theory","author":"Roman S.","year":"1992"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"CIT0017","first-page":"33","volume-title":"Cryptography, Codes and Ciphers: Cryptography and Coding IV","author":"Massey J.","year":"1995"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.860412"}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207160.2015.1091071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,9]],"date-time":"2017-01-09T06:53:06Z","timestamp":1483944786000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207160.2015.1091071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,16]]},"references-count":15,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,10,7]]},"published-print":{"date-parts":[[2017,1,2]]}},"alternative-id":["10.1080\/00207160.2015.1091071"],"URL":"https:\/\/doi.org\/10.1080\/00207160.2015.1091071","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,16]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gcom20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gcom20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}