Generation, distribution, and installation of cryptographic keys | IBM Journals & Magazine | IEEE Xplore