The following publications are possibly variants of this publication:
- Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption SchemeS. Sharmila Deva Selvi, S. Sree Vivek, Neha Jain, Pandu Rangan Chandrasekaran. iacr, 2008:342, 2008. [doi]
- Cryptanalysis of Mu et al. s and Li et al. s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) SchemeS. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan. wisa 2009: 115-129 [doi]
- Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc NetworksS. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Pandu Rangan Chandrasekaran. iacr, 2008:247, 2008. [doi]
- Cryptanalysis of Bohio et al. s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc NetworksS. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan. PST 2008: 109-120 [doi]