Return to Article Details A secure structure for generating remote encryption keys Download Download PDF