A theoretical approach for key exchange which is used for computer security in adhoc wireless networksRead less