Security of access in hostile environments based on the history of nodes in ad hoc networks | IEEE Conference Publication | IEEE Xplore