Return to Article Details Models of Trust and Trusted Computations to an Ad-hoc Network Security Download Download PDF