How to generate and exchange secrets | IEEE Conference Publication | IEEE Xplore