A security analysis of techniques for long-term integrity protection | IEEE Conference Publication | IEEE Xplore