Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme