1. Lecture Notes in Computer Science;J. Benaloh,1990
2. Th. Beth, D. Jungnickel, and H. Lenz,Design Theory, Bibliographisches Institut, Zurich, 1985.
3. G. R. Blakley, Safeguarding cryptographic keys,AFIPS Conference Proceedings, Vol. 48, 1979, pp. 313–317.
4. E. F. Brickell, Some ideal secret sharing schemes,J. Combin. Math. Combin. Comput.,6 (1989), 105–113.
5. Lecture Notes in Computer Science;E. F. Brickell,1990