1. Blakley, B., Blakley, G.R., Chan, A.H., Massey, J.L.: Threshold schemes with dis-enrollment. In E.F. Brickell, editor, Lecture Notes in Computer Science 740, Advances in Cryptology — Crypto '92 (Springer-Verlag, Berlin, 1993) 540–548
2. Blakley, G.R.: Safeguarding cryptographic keys. In the Proceedings of AFIPS 1979 NCC, Vol. 48, Arlington,Va. (1979) 313–317
3. Brickell, E.F., Stinson, D.R.: The detection of cheaters in threshold schemes. In S. Goldwasser, editor, Lecture Notes in Computer Science 403, Advances in Cryptology — CRYPTO '88 (Springer-Verlag, Berlin, 1988) 564–577
4. Cachin, C.: On-line secret sharing. In C. Boyd, editor, Lecture Notes in Computer Science 1025, 5th IMA Conference on Cryptography and Coding (Springer-Verlag, Berlin, 1995) 190–198
5. Charnes, C., Pieprzyk, J., Safavi-Naini, R.: Conditionally secure secret sharing schemes with disenrollment capability. In Proceedings of the 2nd ACM Conference on Computer and Communications Security (Fairfax, Virginia, USA, 1994) 89–95