1. Generalized Secret Sharing and Monotone Functions;Benaloh,1985
2. How to say ‘no’;Beutelspacher,1990
3. Safeguarding cryptographic keys;Blakley,1979
4. Threshold schemes with disenrollment;Blakley,1993
5. Secret sharing schemes for access structures based on graphs;Blundo,1991