M. Jakobsson, and A. Juels. ASIACRYPT '00: Proceedings of the 6th International Conference on
the Theory and Application of Cryptology and Information Security, volume 1976 of Lecture Notes in Computer Science, page 162--177. Springer, (London, UK 2000)
J. Daida, M. Samples, and M. Byom. GECCO 2005: Proceedings of the 2005 conference on
Genetic and evolutionary computation, 2, page 1713--1720. Washington DC, USA, ACM Press, (25-29 June 2005)