Return to Article Details Key Assignment Scheme with Authenticated Encryption Download Download PDF