The following publications are possibly variants of this publication:
- Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious ParticipantsTsu-Yang Wu, Yuh-Min Tseng. informaticaLT, 23(2):315-334, 2012. [doi]
- A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider AttacksTsu-Yang Wu, Yuh-Min Tseng, Ching-Wen Yu. jise, 27(3):915-932, 2011. [doi]
- A Robust Multi-Party Key Agreement Protocol Resistant to Malicious ParticipantsYuh-Min Tseng. cj, 48(4):480-487, 2005. [doi]
- Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic GroupsShuhua Wu, Yuefei Zhu. fc 2008: 69-82 [doi]
- Dynamic tree-based authenticated group key exchange protocolHui Li, Chuankun Wu, Jikai Teng. chinaf, 53(8):1591-1602, 2010. [doi]
- Cryptanalysis of Chang-Wu s group-oriented authentication and key exchange protocolsHung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng. ipl, 80(2):113-117, 2001. [doi]