1. J. C. Benaloh and J. Leichter, Generalized secret sharing and monotone functions,Advances in Cryptology—Crypto '88 Proceedings, Springer-Verlag, Berlin, 1988, pp. 27–35.
2. E. F. Brickell, Some ideal secret sharing schemes,Journal of Combinatorial Mathematics and Combinatorial Computing, vol. 6 (1989), pp. 105–113.
3. E. F. Brickell and D. M. Davenport, On the classification of ideal secret sharing schemes,Advances in Cryptology—Crypto '89 Proceedings, Springer-Verlag, Berlin, 1989, pp. 278–285.
4. M. Ito, A. Saito, and T. Nishizeki, Secret sharing scheme realizing general access structure,Proceedings of the IEEE Global Telecommunications Conference Globecom '87, Tokyo, IEEE Communications Society Press, Washington, DC, 1987, pp. 99–102.
5. A. Shamir, How to share a secret,Communications of the ACM vol. 22 (1979), no. 11, pp. 612–613.