1. Mitchell, C.J. and Piper, F.C., Key Storage in Secure Networks, Discrete Appl. Math., 1988, vol. 21, no. 3, pp. 215–228.
2. D’yachkov, A.G. and Rykov, V.V., On One Application of Codes for a Multiple Access Channel in the ALOHA System, in Proc. VI All-Union School-Seminar on Computer Networks, Moscow-Vinnitsa, 1981, Part 4, pp. 18–24.
3. D’yachkov, A.G. and Rykov, V.V., A Survey of Superimposed Code Theory, Probl. Control Inform. Theory, 1983, vol. 12, no. 4, pp. 229–242.
4. Kautz, W.H. and Singleton, R.C., Nonrandom Binary Superimposed Codes, IEEE Trans. Inform. Theory, 1964, vol. 10, no. 4, pp. 363–377.
5. D’yachkov, A., Macula, A., and Rykov, V.V., New Constructions of Superimposed Codes, IEEE Trans. Inform. Theory, 2000, vol. 46, no. 1, pp. 284–290.