Return to Article Details An Approach for Security in Data Sharing Application for Decentralized Military Network Download Download PDF