1. Beth T., Keeping secrets a personal matter or the exponential security system. In Cryptology and Coding III, edited by M. J. Ganley, Oxford University Press, 1993.
2. Fatmi H.A., Marcher P. J., Jessel M. and Resconi G., “Theory of cybernetic and intelligent machine based on Lie commutators.” International Journal of General Systems, vol. 16, no.2, pp. 123164, 1990.
3. Higgins P.J., “Algebras with a scheme of operators.” Mathematische Nachrichten,vol. 27, pp. 115–132, 1963/64.
4. Hill G., “Category theory for the configuration of complex systems.” In: Proceedings of Third International Conference on Algebraic Methodology and Reasoning Technology, AMAST’93, edited by M. Nivat, C. Rattray, T. Rus and G. Scollo, Workshops in Computing series, Springer-Verlag, London, pp. 193200, 1994.
5. Jessel M., Acoustique Theorique (propagation et holophonie). Masson et Cie Editeurs, Paris, 1973.