Return to Article Details Key Assignment Schemes with Authenticated Encryption, revisited Download Download PDF