L. Adleman, P. Rothemund, and S. Roweiss, On Applying Molecular Computation to the Data Encryption Standard, Journal of Computational Biology, vol.6, issue.1, pp.53-63, 1999.
DOI : 10.1089/cmb.1999.6.53

G. Blakley, Safeguarding Cryptographic Keys, Proceedings of the National Computer Conference, pp.313-317, 1979.

A. Menezes, P. Van-oorschot, and S. Vanstone, Handbook of Applied Cryptography, 2001.
DOI : 10.1201/9781439821916

L. Ogiela, Cognitive Informatics in Automatic Pattern Understanding and Cognitive Information Systems, Advances in Cognitive Informatics and Cognitive Computing, pp.209-226, 2010.
DOI : 10.1007/978-3-642-16083-7_11

L. Ogiela and M. Ogiela, Advences in Cognitive Information Systems, 2012.

M. Ogiela, U. Ogiela, E. Damiani, J. Jeong, and R. Howlett, Security of Linguistic Threshold Schemes in Multimedia Systems, New Directions in Intelligent Interactive Multimedia Systems and Services 2, pp.13-20, 2009.
DOI : 10.1007/978-3-642-02937-0_2

M. Ogiela and U. Ogiela, Shadow Generation Protocol in Linguistic Threshold Schemes, Security Technology: Communication in Computer and Information Science, pp.35-42, 2009.
DOI : 10.1007/978-3-642-10847-1_5

M. Ogiela and U. Ogiela, The use of mathematical linguistic methods in creating secret sharing threshold algorithms, Computers & Mathematics with Applications, vol.60, issue.2, pp.267-271, 2010.
DOI : 10.1016/j.camwa.2010.02.028

M. Ogiela and U. Ogiela, DNA-like linguistic secret sharing for strategic information systems, International Journal of Information Management, vol.32, issue.2, pp.175-181, 2012.
DOI : 10.1016/j.ijinfomgt.2011.11.016

M. Ogiela and U. Ogiela, Linguistic protocols for secure information management and sharing, Computers & Mathematics with Applications, vol.63, issue.2, pp.564-572, 2012.
DOI : 10.1016/j.camwa.2011.10.038

URL : http://doi.org/10.1016/j.camwa.2011.10.038

W. Peters, Representing Humans in System Security Models: An Actor-Network Approach, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.75-92, 2011.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

S. Tang, Simple Secret Sharing and Threshold RSA Signature Schemes, Journal of Information and Computational Science, vol.1, pp.259-262, 2004.
DOI : 10.1007/11596981_28