Optimal scalable security architectures in the presence of colluding mobile traitors | IEEE Conference Publication | IEEE Xplore