The following publications are possibly variants of this publication:
- Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized AdversaryAshish Choudhury, Kaoru Kurosawa, Arpita Patra. acns 2011: 292-308 [doi]
- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile AdversaryArpita Patra, Ashish Choudhary, Madhu Vaidyanathan, C. Pandu Rangan. acisp 2008: 170-186 [doi]
- Perfectly Secure Message Transmission Tolerating Mixed AdversaryArpita Patra, Ashish Choudhury, B. V. Ashwinkumar, Kannan Srinathan, C. Pandu Rangan. iacr, 2008:232, 2008. [doi]
- Round-Efficient Perfectly Secure Message Transmission Scheme Against General AdversaryKaoru Kurosawa. iacr, 2010:450, 2010. [doi]
- Round-efficient perfectly secure message transmission scheme against general adversaryKaoru Kurosawa. dcc, 63(2):199-207, 2012. [doi]
- Perfectly reliable and secure message transmission tolerating mobile adversaryArpita Patra, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan, Prasad Raghavendra. ijact, 1(3):200-224, 2009. [doi]
- Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold AdversaryArpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan. cans 2007: 80-101 [doi]
- Efficient Perfectly Reliable and Secure Communication Tolerating Mobile AdversaryArpita Patra, Ashish Choudhary, Madhu Gayatri, C. Pandu Rangan. iacr, 2008:86, 2008. [doi]