1. N. Alon, J. Bruck, J. Naor, M. Naor and R. Roth, Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs, IEEE Transactions on Information Theory, vol. 38, 1992, pp. 509–516.
2. N. Alon and J. Spencer, The probabilistic method, Wiley, 1992.
3. J. Brassil, S. Low, N. Maxemchuk and L. O’Gorman, Electronic marking and identification techniques to discourage document copying, Proceedings of Infocom’ 94, pp. 1278–1287, June 1994.
4. G. Caronni, Assuring ownership rights for digital images, H.H. Brueggemann and W. Gerhardt-Haeckl (Ed.) Proceedings of ‘reliable IT systems’ (verlaessliche IT-Systeme) VIS’ 95 Vieweg Publishing Company, Germany, 1995.
5. B. Chor, A. Fiat and M. Naor, Tracing traitors, Proceedings of Crypto, 1994, pp. 257–270.