(1)
Key Assignment Schemes With Authenticated Encryption, Revisited. ToSC 2020, 2020 (2), 40-67. https://doi.org/10.13154/tosc.v2020.i2.40-67.