Security equipment in ad hoc networks | IEEE Conference Publication | IEEE Xplore