ABSTRACT

How arrangements need to be made for distributing cryptographic keys among network users