Sciweavers

249 search results - page 2 / 50
» A secure scan design methodology
Sort
View
ISQED
2006
IEEE
107views Hardware» more  ISQED 2006»
13 years 11 months ago
On Optimizing Scan Testing Power and Routing Cost in Scan Chain Design
— With advanced VLSI manufacturing technology in deep submicron (DSM) regime, we can integrate entire electronic systems on a single chip (SoC). Due to the complexity in SoC desi...
Li-Chung Hsu, Hung-Ming Chen
ICCD
2004
IEEE
106views Hardware» more  ICCD 2004»
14 years 2 months ago
Extending the Applicability of Parallel-Serial Scan Designs
Although scan-based designs are widely used in order to reduce the complexity of test generation, test application time and test data volume are substantially increased. We propos...
Baris Arslan, Ozgur Sinanoglu, Alex Orailoglu
LISA
2001
13 years 7 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
CAISE
2003
Springer
13 years 11 months ago
A Methodology for Multilevel Database Design
Abstract. In a Connected Society, the importance of database privacy and security increases considerably. Security must be considered as a fundamental requirement in Information Sy...
Eduardo Fernández-Medina, Mario Piattini