1. C. A. Asmuth and G.R. Blakley, Pooling, splitting and restituting information to overcome total failure of some channels of communication, Proceedings of the 1982 Symposium on Security and Privacy, IEEE Computer Society, Los Angeles, California (1982), pp. 156–169.
2. H. Bauer, Probability Theory and Elements of Measure Theory, Holt, Rinehart and Winston, New York (1969).
3. G. R. Blakley, Safeguarding cryptographic keys, Proceedings of the National Computer Conference, 1979, American Federation of Information Processing Societies-Conference Proceedings, Vol. 48 (1979), pp. 313–317.
4. G. R. Blakley, One-time pads are key safeguarding schemes, not cryptosystems. Fast key safeguarding schemes (threshold schemes) exist, Proceedings of the 1980 Symposium on Security and Privacy, IEEE Computer Society, Long Beach, California (1980), pp. 108–113.
5. G. R. Blakley and Laif Swanson, Security proofs for information protection systems, Proceedings of the 1981 Symposium on Security and Privacy, IEEE Computer Society (1981), Los Angeles, California, pp. 75–82.