Key distribution without individual trusted authentification servers | IEEE Conference Publication | IEEE Xplore