1. D. Beaver, J. Bar-Han. “Non-Cryptographic Fault-Tolerant Computing in a Constant Expected Number of Rounds of Interaction.” Proc. of 21st STOC (1989), 201–209.
2. D. Beaver. “Secure Multiparty Protocols Tolerating Half Faulty Processors.” Technical Report TR-19-88 (September, 1988), Harvard University.
3. M. Ben-Or, S. Goldwasser, A. Wigderson. “Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation.” Proc. of 20th STOC (1988), 1–10.
4. G. R. Blakley, “Security Proofs for Information Protection Systems.” Proceedings of the 1980 Symposium on Security and Privacy, IEEE Computer Society Press, NY (1981), 79–88.
5. M. Ben-Or, T. Rabin. “Verifiable Secret Sharing and Multiparty Protocols with Honest Majority.” 21st STOC (1989), 73–85.