[1]
M. T. Anderson, F. Müller, and L. Kovács, “A Comprehensive Review of Attribute-Based Encryption Schemes: Models, Methods, and Emerging Applications”, IJRAET, vol. 14, no. 2, pp. 160–166, Nov. 2025.