Cryptographic techniques for mobile ad-hoc networks | Publicación