1.
Key Assignment Schemes with Authenticated Encryption, revisited. ToSC [Internet]. 2020 Jul. 24 [cited 2024 Nov. 24];2020(2):40-67. Available from: https://philosophymindscience.org/index.php/ToSC/article/view/8668