1. Csiszár, I. and Körner, J., Information Theory: Coding Theorems for Discrete Memoryless Systems, Cambridge: Cambridge Univ. Press, 2011, 2nd ed.
2. D’yachkov, A.G. and Rykov, V.V., A Survey of Superimposed Code Theory, Probl. Control Inform. Theory, 1983, vol. 12, no. 4, pp. 229–242.
3. D’yachkov, A.G., Vorob’ev, I.V., Polyansky, N.A., and Shchukin, V.Yu., Bounds on the Rate of Disjunctive Codes, Probl. Peredachi Inf., 2014, vol. 50, no. 1, pp. 31–63 [Probl. Inf. Trans. (Engl. Transl.), 2014, vol. 50, no. 1, pp. 27–56].
4. Bassalygo, L.A. and Rykov, V.V., Multiple-Access Hyperchannel, Probl. Peredachi Inf., 2013, vol. 49, no. 4, pp. 3–12 [Probl. Inf. Trans. (Engl. Transl.), 2013, vol. 49, no. 4, pp. 299–307].
5. Boneh, D. and Shaw, J., Collusion-Secure Fingerprinting for Digital Data, IEEE Trans. Inform. Theory, 1998, vol. 44, no. 5, pp. 1897–1905.