Start protecting your digital assets: Free 30-day trial available today. Download now.
Szabo, Nick (2001). "Trusted Third Parties Are Security Holes,"
Tassa, Tamir. "Hierarchical Threshold Secret Sharing,"
Shamir, A. (1979). "How to Share a Secret,"
M. Skibinsky, Y. Dodis (2015). "Asynchronous Mobile Peer-to-Peer Relay,"