General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach | IEEE Conference Publication | IEEE Xplore