{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T04:51:31Z","timestamp":1648961491283},"reference-count":23,"publisher":"Informa UK Limited","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2002,1]]},"DOI":"10.1080\/00207160214648","type":"journal-article","created":{"date-parts":[[2003,9,18]],"date-time":"2003-09-18T22:32:58Z","timestamp":1063924378000},"page":"1285-1301","source":"Crossref","is-referenced-by-count":0,"title":["Bounds And Constructions For Threshold Shared Generation Of Authenticators"],"prefix":"10.1080","volume":"79","author":[{"given":"Rei","family":"Safavi-Naini","sequence":"first","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1007\/BF01940874"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6610(1996)4:5<353::AID-JCD4>3.0.CO;2-E"},{"key":"CIT0004","first-page":"49","volume-title":"Combinatorial Designs and their Applications, Chapman and Hall\/CRC Research Notes in Mathematics","author":"Blackburn S. R.","year":"1999"},{"key":"CIT0005","doi-asserted-by":"crossref","unstructured":"Blackburn, S. R., Burmester, M., Desmedt, Y. and Wild, P. R. 1996.Efficient multiplicative sharing schemes, in Advance in Cryptology-Eurocrypt '96, Vol. 1070, 107\u2013118. LNCS.","DOI":"10.1007\/3-540-68339-9_10"},{"key":"CIT0006","first-page":"141","volume":"43","author":"Brickell B. F.","year":"1984","journal-title":"Congressus Numeruntium"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(96)00146-6"},{"key":"CIT0009","first-page":"65","volume":"2","author":"den Boer B.","year":"1993","journal-title":"Journal of Computer Security"},{"key":"CIT0010","first-page":"99","volume":"1396","author":"Desmedt Y.","year":"1998","journal-title":"Japan (JSW '97}, LNCS"},{"key":"CIT0011","first-page":"2045","volume":"92","author":"Desmedt Y","year":"1992","journal-title":"IEEE Infocom"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008261021505"},{"key":"CIT0013","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1002\/j.1538-7305.1974.tb02751.x","volume":"33","author":"Gilbert E. N.","year":"1974","journal-title":"The Bell System Technical Journal"},{"key":"CIT0014","volume-title":"Contributions to Unconditionally Secure Authentication","author":"Johansson T.","year":"1994"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056621"},{"key":"CIT0016","volume-title":"The Theory of Error-Correcting Codes","author":"MacWilliams F. J.","year":"1977"},{"key":"CIT0017","first-page":"130","volume":"1334","author":"Martin K.","year":"1997","journal-title":"LNCS"},{"key":"CIT0018","volume-title":"Data Structures and Algorithms","volume":"1","author":"Mehlhom K.","year":"1984"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"CIT0020","first-page":"13","author":"Safavi-Naini R.","year":"1998","journal-title":"Designs, Codes and Cryptography"},{"key":"CIT0021","first-page":"401","volume-title":"Advances in Cryptology-Crypto '84","author":"Simmons G. J.","year":"1984"},{"key":"CIT0022","first-page":"379","volume-title":"Contemporary Cryptology, The Science of Information Integrity","author":"Simmons G. J.","year":"1992"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1007\/BF02252868"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1007\/BF00125203"}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207160214648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,10]],"date-time":"2018-03-10T07:17:08Z","timestamp":1520666228000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/00207160214648"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,1]]},"references-count":23,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2002,1]]}},"alternative-id":["10.1080\/00207160214648"],"URL":"https:\/\/doi.org\/10.1080\/00207160214648","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2002,1]]}}}