1. Boneh D., Shaw J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44(5), 1897–1905 (1998).
2. Cohen G.D., Schaathun H.G.: Asymptotic overview on separating codes. Technical Report 248, Department of Informatics, University of Bergen, Norway (2003).
3. Csiszar I., Korner J.: Information Theory: Coding Theorems for Discrete Memoryless Systems. Cambridge University Press, Cambridge (2011).
4. D’yachkov A.G.: Lectures on Designing Screening Experiments. Lecture Note Series 10, Combinatorial and Computational Mathematics Center, Pohang University of Science and Technology (POSTECH), Korea Republic (2003).
5. D’yachkov A.G., Rykov V.V.: An application of codes for the multiple access channel in the ALOHA communication system. In: Proccedings of the 6-th All-Union Seminar in Computing Networks, vol. 4, pp. 18–24. Moscow-Vinnitsa (1981) (in Russian).