Secure scan techniques: a comparison | IEEE Conference Publication | IEEE Xplore