1. J. Benaloh and J. Leichter: Generalized Secret Sharing and Monotone Functions. Advances in Cryptology — Crypto’ 88, Lecture Notes in Comput. Sci. 403 (1990) 27–35
2. G. R. Blakley: Safeguarding cryptographic keys. Proceedings of AFIPS 1979 National Computer Conference 48 (1979) 313–317
3. G. R. Blakley and C. Meadows: Security of Ramp Schemes. Advances in Cryptology — Crypto’ 84, Lecture Notes in Comput. Sci. 196 (1985) 411–431
4. R. Blom: An Optimal Class of Symmetric Key Generation Systems. Advances in Cryptology-Eurocrypt’84, Lecture Notes in Comput. Sci. 209 (1984) 335–338
5. C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. Presented at Crypto’92