Citation: M. Naor et A. Wool, ACCESS-CONTROL AND SIGNATURES VIA QUORUM SECRET SHARING, IEEE transactions on parallel and distributed systems, 9(9), 1998, pp. 909-922
Citation: T. Grossman et A. Wool, COMPUTATIONAL EXPERIENCE WITH APPROXIMATION ALGORITHMS FOR THE SET COVERING PROBLEM, European journal of operational research, 101(1), 1997, pp. 81-92