[1]
S. Kandele and S. Paul, “Key Assignment Scheme with Authenticated Encryption”, ToSC, vol. 2018, no. 4, pp. 150–196, Dec. 2018.