An application of intrusion tolerant concepts to a software infrastructure
for supporting secure group applications. This application is suited for
use with network layer protocols such as TBRPF and is particularly
adapted for wireless networks, and more specifically mobile ad hoc
networks.