{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T21:22:29Z","timestamp":1697664149286},"reference-count":0,"publisher":"Springer Science and Business Media LLC","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1023\/a:1008200319697","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T13:47:34Z","timestamp":1040564854000},"page":"5-22","source":"Crossref","is-referenced-by-count":8,"title":[],"prefix":"10.1007","volume":"14","author":[{"given":"F. E.","family":"Bennett","sequence":"first","affiliation":[]},{"given":"J.","family":"Yin","sequence":"additional","affiliation":[]},{"given":"H.","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"R. J. R.","family":"Abel","sequence":"additional","affiliation":[]}],"member":"297","container-title":["Designs, Codes and Cryptography"],"original-title":[],"deposited":{"date-parts":[[2012,12,27]],"date-time":"2012-12-27T23:49:10Z","timestamp":1356652150000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1023\/A:1008200319697"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"references-count":0,"journal-issue":{"issue":"1"},"alternative-id":["153098"],"URL":"https:\/\/doi.org\/10.1023\/a:1008200319697","relation":{},"ISSN":["0925-1022"],"issn-type":[{"value":"0925-1022","type":"print"}],"subject":[],"published":{"date-parts":[[1998]]}}}
  NODES