2018 IEEE International Test Conference (ITC) 2018
DOI: 10.1109/test.2018.8624777
|View full text |Cite
|
Sign up to set email alerts
|

IJTAG Integrity Checking with Chained Hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…In this type of scheme, data are preprocessed before sending them to the cloud by applying techniques such as encryption to reduce security issues [39], [88], [89], and reliability schemes based on coding and redundancy to face outages [47]- [49], [90] or failures in the cloud [44], [91]. Indexing and hashing techniques have been proposed to verify the integrity of the data [92], [93]. For instance, Moosavi et al [94] proposed an end-to-end scheme to ensure the data before sending them to the transportation stage in a mobility environment.…”
Section: Related Workmentioning
confidence: 99%
“…In this type of scheme, data are preprocessed before sending them to the cloud by applying techniques such as encryption to reduce security issues [39], [88], [89], and reliability schemes based on coding and redundancy to face outages [47]- [49], [90] or failures in the cloud [44], [91]. Indexing and hashing techniques have been proposed to verify the integrity of the data [92], [93]. For instance, Moosavi et al [94] proposed an end-to-end scheme to ensure the data before sending them to the transportation stage in a mobility environment.…”
Section: Related Workmentioning
confidence: 99%