Building reliable secure computing systems out of unreliable insecure components | IEEE Conference Publication | IEEE Xplore