1. J. C. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In Advances in Cryptology-Crypto '88, New York, pp. 27–36, 1990.
2. G. R. Blakley. Safeguarding cryptographic keys. In Proceedings of the AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317, 1979.
3. E. F. Brickell. Some ideal secret sharing schemes. Journal of Combinatorial Mathematics and Combinatorial Computing, 6:105–113, 1989.
4. M. Hall, Jr. Combinatorial Theory. Wiley, New York, 1986.
5. M. Ito, A. Saito, and T. Nishizeki. Secret sharing scheme realizing general access structure. In Proceedings of IEEE Globecom '87, Tokyo, pp. 99–102, 1987.