The following publications are possibly variants of this publication:
- Identity-based deniable authenticated encryption and its application to e-mail systemFagen Li, Zhaohui Zheng, Chunhua Jin. telsys, 62(4):625-639, 2016. [doi]
- Certificateless deniably authenticated encryption and its application to e-voting systemEmmanuel Ahene, Chunhua Jin, Fagen Li. telsys, 70(3):417-434, 2019. [doi]
- An Efficient Identity-Based Deniable Authenticated Encryption SchemeWeifeng Wu, Fagen Li. itiis, 9(5):1904-1919, 2015. [doi]