1. [1] G.J. Simmons, “An introduction to shared secret and/or shared control schemes and the application,” Contemporary Cryptology: The Science of Information Integrity, pp.441-497, 1992.
2. [2] A. Shamir, “How to share a secret,” Commun. ACM, vol.22, no.11, pp.612-613, Nov. 1979.
3. [3] J.W. Suurballe, “Disjoint paths in a network,” Netw., vol.4, pp.125-145, 1974.
4. [4] D Sidhu, R. Nair, and S. Abdallah, “Finding disjoint paths in networks,” Proc. ACM SIGCOMM'91, pp.43-51, 1991.
5. [5] W. Lou and Y. Fang, “A multipath routing approach for secure data delivery,” Proc. IEEE MILCOM 2001, pp.1467-1473, 2001.