The following publications are possibly variants of this publication:
- An authenticated group key distribution protocol based on the generalized Chinese remainder theoremCheng Guo, Chin-Chen Chang. ijcomsys, 27(1):126-134, 2014. [doi]
- A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder TheoremYanjun Liu 0002, Chin-Chen Chang 0001. jihmsp, 5(4):709-718, 2014. [doi]
- A Database Encryption Scheme Based on the Generalized Aryabhata Remainder TheoremYanjun Liu 0002, Chin-Chen Chang 0001. jihmsp, 5(4):603-613, 2014. [doi]
- An Access Control Mechanism Based on the Generalized Aryabhata Remainder TheoremYanjun Liu, Chin-Chen Chang, Shih-Chang Chang. ijnsec, 16(1):58-64, 2014. [doi]