2006
DOI: 10.1007/s10836-006-7720-x
|View full text |Cite
|
Sign up to set email alerts
|

Security Extension for IEEE Std 1149.1

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(18 citation statements)
references
References 0 publications
0
18
0
Order By: Relevance
“…One of the first approaches for implementing a secure JTAG appears in [8]. It presents a locking/unlocking mechanism for controlling the access to the JTAG instructions.…”
Section: Previous Workmentioning
confidence: 99%
See 2 more Smart Citations
“…One of the first approaches for implementing a secure JTAG appears in [8]. It presents a locking/unlocking mechanism for controlling the access to the JTAG instructions.…”
Section: Previous Workmentioning
confidence: 99%
“…Most of the previous approaches [8,9,10,11,26] suppose a one-way authentication, where either the circuit or the server is considered trusted. In this paper, we propose a suitable solution in cases where neither the circuit nor the server is trusted.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Previous works have proposed two separate approaches to user authentication, which are two-entity authentication and three-entity authentication. The two-entity authentication uses a shared secret key between the device and the user [9,10]. A user with the key can authenticate oneself regardless of time or place, minimizing the loss of availability while maintaining a certain level of security.…”
Section: Related Workmentioning
confidence: 99%
“…Scan chain is accessed and scan data is obtained through these test interfaces. In some cases, secure test interfaces are implemented in a chip where the access to the scan chain is limited somehow [2], [3], but it is pointed out that there still exist LSI chips on which these test interfaces can be accessed nonsecurely [1], [4], [5]. Scan data itself can be secured or compressed and several secure scan architectures are proposed [5].…”
Section: Introductionmentioning
confidence: 99%