Return to Article Details Authentication Procedures for Ad-hoc Networks: Taxonomy and Investigation Subjects Download Download PDF