Exploiting the overlap of security and fault-tolerance | IEEE Conference Publication | IEEE Xplore