On Protecting IJTAG from Data Sniffing and Alteration Attacks | IEEE Conference Publication | IEEE Xplore