{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T17:34:27Z","timestamp":1692293667586},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,1,28]],"date-time":"2016-01-28T00:00:00Z","timestamp":1453939200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (CN)","doi-asserted-by":"publisher","award":["11301370","11571251","11222113","11431003"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013088","name":"Qing Lan Project","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100013088","id-type":"DOI","asserted-by":"crossref"}]},{"name":"A project funded by the priority academic grogram development of JiangSu higher education institutions"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s12095-015-0179-9","type":"journal-article","created":{"date-parts":[[2016,1,28]],"date-time":"2016-01-28T06:40:05Z","timestamp":1453963205000},"page":"407-430","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Some new classes of 2-fold optimal or perfect splitting authentication codes"],"prefix":"10.1007","volume":"9","author":[{"given":"Miao","family":"Liang","sequence":"first","affiliation":[]},{"given":"Lijun","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Jingcai","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,28]]},"reference":[{"key":"179_CR1","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s001459900049","volume":"12","author":"C Blundo","year":"1999","unstructured":"Blundo, C., De Santis, A., Kurosawa, K., Ogata, W.: On a fallacious bound for authentication codes. J. Cryptol 12, 155\u2013159 (1999)","journal-title":"J. Cryptol"},{"key":"179_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0012-365X(77)90037-1","volume":"20","author":"AE Browwer","year":"1977","unstructured":"Browwer, A.E., Schrijver, A., Hanani, H.: Group divisible designs with block size 4. Discrete Math. 20, 1\u201310 (1977)","journal-title":"Discrete Math."},{"key":"179_CR3","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3934\/amc.2011.5.59","volume":"5","author":"YM Chee","year":"2011","unstructured":"Chee, Y.M., Zhang, X., Zhang, H.: Infinite families of optimal splitting authentication codes secure against spoofing attacks of higher order. Adv. Math. Commun. 5, 59\u201368 (2011)","journal-title":"Adv. Math. Commun."},{"key":"179_CR4","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0097-3165(92)90099-G","volume":"59","author":"CJ Colbourn","year":"1992","unstructured":"Colbourn, C.J., Hoffman, D.G., Rees, R.: A new class of group divisible designs with block size three. J. Combin. Theory Ser A 59, 73\u201389 (1992)","journal-title":"J. Combin. Theory Ser A"},{"key":"179_CR5","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1137\/070709141","volume":"23","author":"CJ Colbourn","year":"2008","unstructured":"Colbourn, C.J., Fu, H., Ge, G., Ling, A.C.H., Lu, H.: Minimizing SONET ADMs in unidirectional WDM rings with grooming ratio 7. SIAM. J. Discrete Math. 23, 109\u2013122 (2008)","journal-title":"J. Discrete Math."},{"key":"179_CR6","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/BF00196910","volume":"3","author":"M De Soete","year":"1991","unstructured":"De Soete, M.: New bounds and constructions for authentication\/secrecy codes with splitting. J. Cryptol 3, 173\u2013186 (1991)","journal-title":"J. Cryptol"},{"key":"179_CR7","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1002\/jcd.20025","volume":"12","author":"B Du","year":"2004","unstructured":"Du, B.: Splitting balanced incomplete block designs with block size 3\u00d72. J. Combin. Designs 12, 404\u2013420 (2004)","journal-title":"J. Combin. Designs"},{"key":"179_CR8","first-page":"287","volume":"31","author":"B Du","year":"2005","unstructured":"Du, B.: Splitting balanced incomplete block designs. Australas. J. Combin 31, 287\u2013298 (2005)","journal-title":"Australas. J. Combin"},{"key":"179_CR9","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1137\/S0895480103435469","volume":"18","author":"G Ge","year":"2005","unstructured":"Ge, G., Miao, Y., Wang, L.: Combinatorial constructions for optimal splitting authentication codes. SIAM. J. Discrete Math 18, 663\u2013678 (2005)","journal-title":"J. Discrete Math"},{"key":"179_CR10","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.disc.2004.04.003","volume":"285","author":"G Ge","year":"2004","unstructured":"Ge, G., Ling, A.C.H.: Group divisible designs with block size four and group type g u m 1 for small g. Discrete Math 285, 97\u2013120 (2004)","journal-title":"Discrete Math"},{"key":"179_CR11","first-page":"129","volume":"41","author":"H-DOF Gronau","year":"1995","unstructured":"Gronau, H.-D.O.F., Mullin, R.C., Pietsch, C.: The closure of all subsets of {3,4,\u2026,10} which include 3. Ars Combin 41, 129\u2013161 (1995)","journal-title":"Ars Combin"},{"key":"179_CR12","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/0012-365X(75)90040-0","volume":"11","author":"H Hanani","year":"1975","unstructured":"Hanani, H.: Balanced incomplete block designs and related designs. Discrete Math 11, 255\u2013369 (1975)","journal-title":"Discrete Math"},{"key":"179_CR13","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s12095-010-0020-4","volume":"2","author":"M Huber","year":"2002","unstructured":"Huber, M.: Combinatorial bounds and characterizations of splitting authentication codes. Cryptogr. Commun 2, 173\u2013185 (2002)","journal-title":"Cryptogr. Commun"},{"key":"179_CR14","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s10623-010-9433-5","volume":"60","author":"M Liang","year":"2011","unstructured":"Liang, M., Du, B.: A new class of splitting 3-designs. Des. Codes Cryptogr 60, 283\u2013290 (2011)","journal-title":"Des. Codes Cryptogr"},{"key":"179_CR15","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s10623-011-9496-y","volume":"62","author":"M Liang","year":"2012","unstructured":"Liang, M., Du, B.: A new class of 3-fold perfect splitting authentication codes. Des. Codes Cryptogr 62, 109\u2013119 (2012)","journal-title":"Des. Codes Cryptogr"},{"key":"179_CR16","first-page":"15","volume":"89","author":"M Liang","year":"2012","unstructured":"Liang, M., Du, B.: Existence of optimal restricted strong partially balanced designs. Utilitas Math 89, 15\u201331 (2012)","journal-title":"Utilitas Math"},{"key":"179_CR17","unstructured":"Liang, M., Jiang, S., Du, B.: A new class of 2-fold perfect 4-splitting authentication codes. Ars Combin. appear"},{"key":"179_CR18","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/S0012-365X(03)00283-8","volume":"279","author":"W Ogata","year":"2004","unstructured":"Ogata, W., Kurosawa, K., Stinson, D.R., Saido, H.: New combinatorial designs and their applications to authentication codes and secret sharing schemes. Discrete Math 279, 383\u2013405 (2004)","journal-title":"Discrete Math"},{"key":"179_CR19","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/BF00191354","volume":"8","author":"D Pei","year":"1995","unstructured":"Pei, D.: Information-theoretic bounds for authentication codes and block designs. J. Cryptol 8, 177\u2013188 (1995)","journal-title":"J. Cryptol"},{"key":"179_CR20","doi-asserted-by":"crossref","unstructured":"Pei, D., Li, Y., Wang, Y., Safavi-Naini, R.: Characterization of optimal authentication codes with arbitration. In: Pieprzyk. J., Safavi-Naini, R., Seberry, J. (eds.) Information Security and Privacy. Lecture Notes in Computer Science, vol. 1587, pp 303\u2013313. Springer, Berlin (1999)","DOI":"10.1007\/3-540-48970-3_25"},{"key":"179_CR21","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/BF00198462","volume":"6","author":"U Rosenbaum","year":"1993","unstructured":"Rosenbaum, U.: A lower bound on authentication after having abserved a sequence of messages. J. Cryptol 6, 135\u2013156 (1993)","journal-title":"J. Cryptol"},{"key":"179_CR22","first-page":"53","volume":"2","author":"A Sgarro","year":"1994","unstructured":"Sgarro, A.: Information-theoretic bounds for authentication frauds. J. Comput. Security 2, 53\u201363 (1994)","journal-title":"J. Comput. Security"},{"key":"179_CR23","doi-asserted-by":"crossref","unstructured":"Simmons, G.J.: Message authentication with arbitration of transmitter\/receiver disputes. In: Chaum, D., Price, W.L (eds.) Advances in Cryptology-EUROCRYP\u201987. Lecture Notes in Computer Science, vol. 304, pp 151\u2013165. Springer, Berlin (1988)","DOI":"10.1007\/3-540-39118-5_15"},{"key":"179_CR24","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/BF00204449","volume":"2","author":"GJ Simmons","year":"1990","unstructured":"Simmons, G.J.: A Cartesian product construction for unconditionally secure authentication codes thai permit arbitration. J. Cryptol 2, 77\u2013104 (1990)","journal-title":"J. Cryptol"},{"key":"179_CR25","doi-asserted-by":"crossref","first-page":"1586","DOI":"10.1109\/18.333871","volume":"40","author":"B Smeets","year":"1994","unstructured":"Smeets, B.: Bound on the probability of deception in multiple authentication. IEEE Trans. Inf. Theory 40, 1586\u20131591 (1994)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"179_CR26","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s10623-005-1501-x","volume":"38","author":"J Wang","year":"2006","unstructured":"Wang, J.: A new class of optimal 3-splitting authentication codes. Des. Codes Cryptogr 38, 373\u2013381 (2006)","journal-title":"Des. Codes Cryptogr"},{"key":"179_CR27","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1007\/s10440-008-9346-8","volume":"109","author":"J Wang","year":"2010","unstructured":"Wang, J., Su, R.: Further results on the existence of splitting BIBDs and application to authentication codes. Acta Appl. Math 109, 791\u2013803 (2010)","journal-title":"Acta Appl. Math"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0179-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-015-0179-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0179-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0179-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,14]],"date-time":"2020-09-14T13:31:48Z","timestamp":1600090308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-015-0179-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,28]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["179"],"URL":"https:\/\/doi.org\/10.1007\/s12095-015-0179-9","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,28]]}}}