1. E.N. Gilbert, F.J. MacWilliams and N.J.A. Sloane, “Codes which detect deception”, Bell Syst. Tech. J., Vol. 53, 1974, pp. 405–424.
2. Lect Notes Comput Sci;G.J. Simmons,1985
3. J.L. Massey, “Contemporary Cryptology, An Introduction”, in Contemporary Cryptology, The Science of Information Integrity, G.J Simmons, Ed., IEEE Press, 1991, pp. 3–39.
4. G.J. Simmons, “A survey of Information Authentication”, in Contemporary Cryptology, The science of information integrity, ed. G.J. Simmons, IEEE Press, New York, 1992.
5. D.R. Stinson, “The combinatorics of authentication and secrecy codes”, Journal of Cryptology, Vol. 2, no 1, 1990, pp. 23–49.