1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
2. Lecture Notes in Computer Science;JC Benaloh,1987
3. Hadavi, M.A., Jalili, R.: Secure data outsourcing based on threshold secret sharing; towards a more practical solution. In: Proceedings of VLDB Ph.D. Workshop, pp. 54–59 (2010)
4. Hadavi, M.A., Noferesti, M., Jalili, R., Damiani, E.: Database as a service: towards a unified solution for security requirements. In: 36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16–20, 2012, pp. 415–420 (2012)
5. Lecture Notes in Computer Science;MA Hadavi,2013