{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:21:41Z","timestamp":1725600101111},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.23919\/isita.2018.8664387","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T19:49:11Z","timestamp":1552333751000},"page":"223-227","source":"Crossref","is-referenced-by-count":1,"title":["A Construction of the (4, n)-Threshold Visual Cryptography Scheme Using a 3-Design"],"prefix":"10.23919","author":[{"given":"Koutaro","family":"Okada","sequence":"first","affiliation":[]},{"given":"Hiroki","family":"Koga","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(98)00034-X"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2158096"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2170975"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e90-a.5.949"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-009-9327-6"},{"journal-title":"Handbook of Combinatorial Designs","year":"2007","author":"colbourn","key":"ref15"},{"journal-title":"Combinatorial Designs Constructions and Analysis","year":"2003","author":"stinson","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012504516447"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(99)00243-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480198336683"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1007\/3-540-36178-2_21","article-title":"A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme","author":"koga","year":"2002","journal-title":"Advances in Cryptology - ASIACRYPT 2002 LNCS 2501"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2017.8277939"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261792"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900057"},{"key":"ref1","first-page":"1","article-title":"Visual Cryptography","author":"naor","year":"1995","journal-title":"Advance in Cryptography- EUROCRYPT 1994 LNCS 950"},{"key":"ref9","first-page":"401","article-title":"New Results on Visual Cryptography","author":"droste","year":"1996","journal-title":"Advances in Cryptography - CRYPTO &#x2019;96 LNCS 1109"}],"event":{"name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2018,10,28]]},"location":"Singapore","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 International Symposium on Information Theory and Its Applications (ISITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8660385\/8664205\/08664387.pdf?arnumber=8664387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:48:49Z","timestamp":1643251729000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8664387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/isita.2018.8664387","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}