Return to Article Details Analysis of Secure Wireless Networks