1. Kabatiansky, G.A., Codes for Copyright Protection: The Case of Two Pirates, Probl. Peredachi Inf., 2005, vol. 41, no. 2, pp. 123–127 [Probl. Inf. Trans. (Engl. Transl.), 2005, vol. 41, no. 2, pp. 182–186].
2. Silverberg, A., Staddon, J., and Walker, J.L., Efficient Traitor Tracing Algorithms Using List Decoding, Advances in Cryptology¡ªASIACRYPT’2001 (Proc. 7th Int. Conf. on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, Dec. 9–13, 2001), Boyd, C., Ed., Lect. Notes Comp. Sci., vol. 2248, Berlin: Springer, 2001, pp. 175–192.
3. Staddon, J.N., Stinson, D.R., and Wei, R., Combinatorial Properties of Frameproof and Traceability Codes, IEEE Trans. Inform. Theory, 2001, vol. 47, no. 3, pp. 042–1049.
4. Deundyak, V.M. and Mkrtichyan, V.V., Investigation of the Limits of Applicability of an Information Protection Scheme Based on Reed–Solomon Codes, Diskretn. Anal. Issled. Oper., 2011, vol. 18, no. 3, pp. 21–38.
5. Deundyak, V.M. and Mkrtichyan, V.V., Mathematical Model of an Efficient Scheme of Special Broadcast Encrypion and Investigation of Its Applicability Limits, Izv. Vyssh. Uchebn. Zaved. Sev.-Kavk. Reg. Estestv. Nauki, 2009, no. 1, pp. 5–8.