Szabo, Nick (2001). “Trusted Third Parties Are Security Holes,” Szabo, Nick (2001). "Trusted Third Parties Are Security Holes,"
Tassa, Tamir. “Hierarchical Threshold Secret Sharing,” Tassa, Tamir. "Hierarchical Threshold Secret Sharing,"
M. Skibinsky, Y. Dodis (2015). “Asynchronous Mobile Peer-to-Peer Relay” M. Skibinsky, Y. Dodis (2015). "Asynchronous Mobile Peer-to-Peer Relay,"