Michael O.Rabin, "Probabilistic Algorithms in Finite Fields", Siam J. Comput. vol. 9, No. 2, May 1980, pp. 273-280. |
Michael O. Rabin, Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance, Journal of the Association for Computing Machinery, vol. 36, No. 2, Apr. 1989, pp. 335-348. |
R.J. McEliece and D.V. Sarwate, "On Sharing Secrets and Reed-Solomon Codes", Communications of the ACM, Sep. 1981 vol. 24, No. 9, pp. 583-584. |
Adi Shamir, "How to Share a Secret", communications of the ACM, Nov., 1979; vol. 22, No. 11, pp. 612-613. |
C.A. Asmuth and G.R. Blakley, Proceedings of the 1982 Symposium on Security and Privacy, IEEE Computer Society, Apr. 26-28, 1982 Oakland California, pp. 156-169. |
Ehud D. Karnin, et al. "On Secret Sharing Systems", IEEE Transactions on Information Theory, vol. It-29, No. 1, Jan. 1983. |
McAuley, "Reliable Broadband Communication Using A Burst Erasure Correcting Code", SIGCOMM '90 Symposium, pp. 297-306, Sep. 1990. |