Return to Article Details Secure Transmission by Using Mobile Ad hoc Networks Download Download PDF