Applying a cryptographic scheme in the RPINA protocol | IEEE Conference Publication | IEEE Xplore