Keynote 2: using randomized techniques to build scalable intrusion-tolerant overlay networks | IEEE Conference Publication | IEEE Xplore