Further Results on the Existence of Splitting BIBDs and Application to Authentication Codes