Return to Article Details an approach based on secure mobile ad-hoc network Download Download PDF