1.
Key Assignment Schemes with Authenticated Encryption, revisited. ToSC. 2020;2020(2):40-67. doi:10.13154/tosc.v2020.i2.40-67