Introduction to "building reliable secure computing systems out of unreliable insecure components" | IEEE Conference Publication | IEEE Xplore