1. Asmuth, C.A., Blakley, G.R. (1982) Pooling, splitting and reconstructing information to overcome total failure on some channels of communication. Proc. IEEE Computer Society 1982 Symp. on Security and Privacy, 156–169.
2. Asmuth, C., Bloom, J. (1983) A Modular Approach to Key Safeguarding. IEEE Transactions on Information Theory, IT-3O, 208–10.
3. Beutelspacher, A. (1988) Enciphered geometry: Some applications of geometry to cryptography. Annals of Discrete Mathematics, 37, 59–68, North Holland
4. Beutelspacher, A. (1990) How to say ‘no’. Proceedings of Eurocrypt’89, 491–6, Springer Verlag. Berlin
5. Beutelspacher, A., Vedder, K. (1987) Geometric Structures as threshold schemes. Proceedings of the 1987 IMA Conf. on Cryptography and Coding Theory, Cirencester ( England ), Oxford University Press