1. Lect Notes Comput Sci;J. Benaloh,1990
2. C. Berge. Graphs. Second revised edition, North-Holland, 1985.
3. G. R. Blakley. Safeguarding cryptographic keys. AFIPS Conference Proceedings, 48:313–317, 1979.
4. C. Blundo. Secret Sharing Schemes for Access Structures based on Graphs. Tesi di Laurea, University of Salerno, Italy, 1991, (in Italian).
5. E. F. Brickell. Some ideal secret sharing schemes. J. Combin. Math. and Combin. Comput., 9:105–113, 1989.