{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T08:19:19Z","timestamp":1648887559899},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,3,27]],"date-time":"2011-03-27T00:00:00Z","timestamp":1301184000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1007\/s10623-011-9496-y","type":"journal-article","created":{"date-parts":[[2011,3,26]],"date-time":"2011-03-26T11:32:30Z","timestamp":1301139150000},"page":"109-119","source":"Crossref","is-referenced-by-count":6,"title":["A new class of 3-fold perfect splitting authentication codes"],"prefix":"10.1007","volume":"62","author":[{"given":"Miao","family":"Liang","sequence":"first","affiliation":[]},{"given":"Beiliang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,3,27]]},"reference":[{"key":"9496_CR1","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3934\/amc.2011.5.59","volume":"5","author":"Y.M. Chee","year":"2011","unstructured":"Chee Y.M., Zhang X., Zhang H.: Infinite families of optimal splitting authentication codes secure against spoofing attacks of higher order. Adv. Math. Commun. 5, 59\u201368 (2011)","journal-title":"Adv. Math. Commun."},{"key":"9496_CR2","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1002\/jcd.20025","volume":"12","author":"B. Du","year":"2004","unstructured":"Du B.: Splitting balanced incomplete block designs with block size 3\u00a0\u00d7 2. J. Comb. Des. 12, 404\u2013420 (2004)","journal-title":"J. Comb. Des."},{"key":"9496_CR3","first-page":"287","volume":"31","author":"B. Du","year":"2005","unstructured":"Du B.: Splitting balanced incomplete block designs. Australas. J. Comb. 31, 287\u2013298 (2005)","journal-title":"Australas. J. Comb."},{"key":"9496_CR4","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1137\/S0895480103435469","volume":"18","author":"G. Ge","year":"2005","unstructured":"Ge G., Miao Y., Wang L.: Combinatorial constructions for optimal splitting authentication codes. SIAM J. Discret. Math. 18, 663\u2013678 (2005)","journal-title":"SIAM J. Discret. Math."},{"key":"9496_CR5","doi-asserted-by":"crossref","first-page":"145","DOI":"10.4153\/CJM-1960-013-3","volume":"12","author":"H. Hanani","year":"1960","unstructured":"Hanani H.: On quadruple systems. Can. J. Math. 12, 145\u2013157 (1960)","journal-title":"Can. J. Math."},{"key":"9496_CR6","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/0012-365X(92)00055-V","volume":"124","author":"A. Hartman","year":"1994","unstructured":"Hartman A.: The fundamental construction for 3-designs. Discret. Math. 124, 107\u2013132 (1994)","journal-title":"Discret. Math."},{"key":"9496_CR7","first-page":"205","volume-title":"Contemporary Design Theory","author":"A. Hartman","year":"1992","unstructured":"Hartman A., Phelps K.T.: Steiner quadruple systems. In: Dinitz, J.H., Stinson, D.R. (eds) Contemporary Design Theory, pp. 205\u2013240. Wiley, New York (1992)"},{"key":"9496_CR8","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s12095-010-0020-4","volume":"2","author":"M. Huber","year":"2010","unstructured":"Hartman A., Phelps K.T.: Combinatorial bounds and characterizations of splitting authentication codes Cryptogr. Commun. 2 173\u2013185 (2010).","journal-title":"Cryptogr. Commun."},{"key":"9496_CR9","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1002\/jcd.20184","volume":"17","author":"L. Ji","year":"2009","unstructured":"Ji L.: An improvement on H design. J. Comb. Des. 17, 25\u201335 (2009)","journal-title":"J. Comb. Des."},{"key":"9496_CR10","first-page":"159","volume":"63","author":"M. Liang","year":"2007","unstructured":"Liang M., Du B.: Splitting balanced incomplete block designs with block size 2\u00a0\u00d7 4. J. Comb. Math. Comb. Comput. 63, 159\u2013172 (2007)","journal-title":"J. Comb. Math. Comb. Comput."},{"key":"9496_CR11","doi-asserted-by":"crossref","unstructured":"Liang M., Du B.: A new class of splitting 3-designs. Des. Codes Cryptogr. doi: 10.1007\/s10623-010-9433-5 .","DOI":"10.1007\/s10623-010-9433-5"},{"key":"9496_CR12","unstructured":"Liang M., Du B.: Existence of optimal restricted strong partially balanced designs. Utilitas Math. (to appear)."},{"key":"9496_CR13","unstructured":"Mills W.H.: On the covering of triples by quadruple. In: Proceedings of the 5th Southeastern Conference on Combinatorics, Graph Theory and Computing, Florida Atlantic University, Boca Raton, pp. 563\u2013581 (1974)."},{"key":"9496_CR14","first-page":"129","volume":"79","author":"W.H. Mills","year":"1990","unstructured":"Mills W.H.: On the existence of H designs. Congr. Numer. 79, 129\u2013141 (1990)","journal-title":"Congr. Numer."},{"key":"9496_CR15","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/S0378-3758(02)00226-4","volume":"106","author":"H. Moh\u00e1csy","year":"2002","unstructured":"Moh\u00e1csy H., Ray-Chaudhuri D.K.: Candelabra systems and designs. J. Stat. Plann. Infer. 106, 419\u2013448 (2002)","journal-title":"J. Stat. Plann. Infer."},{"key":"9496_CR16","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/S0012-365X(03)00283-8","volume":"279","author":"W. Ogata","year":"2004","unstructured":"Ogata W., Kurosawa K., Stinson D.R., Saido H.: New combinatorial designs and their applications to authentication codes and secret sharing schemes. Discret. Math. 279, 383\u2013405 (2004)","journal-title":"Discret. Math."},{"key":"9496_CR17","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/BF00191354","volume":"8","author":"D. Pei","year":"1995","unstructured":"Pei D.: Information-theoretic bounds for authentication codes and block designs. J. Cryptol. 8, 177\u2013188 (1995)","journal-title":"J. Cryptol."},{"key":"9496_CR18","doi-asserted-by":"crossref","unstructured":"Pei D.: Authentication Codes and Combinatorial Designs. Chapman Hall\/CRC, Boca Raton, FL (2006)","DOI":"10.1201\/9781420003185"},{"key":"9496_CR19","unstructured":"Pei D., Li Y., Wang Y., Safavi-Naini R.: Characterization of authentication codes with arbitration. In: Lecture Notes in Computer Science, vol. 1587, pp. 303\u2013313. Springer, Berlin-Heidelberg-New York (1999)."},{"key":"9496_CR20","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s10623-005-1501-x","volume":"38","author":"J. Wang","year":"2006","unstructured":"Wang J.: A new class of optimal 3-splitting authentication codes. Des. Codes Cryptogr. 38, 373\u2013381 (2006)","journal-title":"Des. Codes Cryptogr."},{"key":"9496_CR21","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1007\/s10440-008-9346-8","volume":"109","author":"J. Wang","year":"2010","unstructured":"Wang J., Su R.: Further results on the existence of splitting BIBDs and application to authentication codes. Acta Appl. Math. 109, 791\u2013803 (2010)","journal-title":"Acta Appl. Math."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9496-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-011-9496-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9496-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T16:38:22Z","timestamp":1592411902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-011-9496-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,27]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["9496"],"URL":"https:\/\/doi.org\/10.1007\/s10623-011-9496-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3,27]]}}}