{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:48:46Z","timestamp":1729673326895,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/isit.2009.5206028","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T15:09:52Z","timestamp":1251126592000},"page":"1105-1109","source":"Crossref","is-referenced-by-count":5,"title":["Authentication and secrecy codes for equiprobable source probability distributions"],"prefix":"10.1109","author":[{"given":"Michael","family":"Huber","sequence":"first","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1007\/978-3-0346-0002-6"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1142\/9789812837172_0004"},{"key":"11","first-page":"23","article-title":"some constructions for authentication - secrecy codes","volume":"330","author":"de soete","year":"1988","journal-title":"Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1007\/BF02948948"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1007\/BF02252868"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/TDSC.2010.10"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1002\/j.1538-7305.1974.tb02751.x"},{"year":"0","author":"scho?bi","article-title":"perfect authentication systems for data sources with arbitrary statistics (presented at eurocrypt '86)","key":"10"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1007\/3-540-39568-7_32"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1201\/9781420003185","author":"pei","year":"2006","journal-title":"Authentication Codes and Combinatorial Designs"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1023\/B:DESI.0000036248.82691.11"},{"year":"2006","journal-title":"Handbook of Combinatorial Designs","key":"9"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1017\/CBO9780511549533"}],"event":{"name":"2009 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2009,6,28]]},"location":"Seoul, South Korea","end":{"date-parts":[[2009,7,3]]}},"container-title":["2009 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5179947\/5205248\/05206028.pdf?arnumber=5206028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,21]],"date-time":"2020-05-21T18:04:13Z","timestamp":1590084253000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5206028\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isit.2009.5206028","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}