Figure 5From: A survey and taxonomy of distributed certificate authorities in mobile ad hoc networksTechniques for providing security in DCA systems.Back to article page