{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:00:34Z","timestamp":1725573634394},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540303176"},{"type":"electronic","value":"9783540322726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11587514_13","type":"book-chapter","created":{"date-parts":[[2005,10,26]],"date-time":"2005-10-26T09:51:49Z","timestamp":1130320309000},"page":"184-199","source":"Crossref","is-referenced-by-count":2,"title":["Arc3D: A 3D Obfuscation Architecture"],"prefix":"10.1007","author":[{"given":"Mahadevan","family":"Gomathisankaran","sequence":"first","affiliation":[]},{"given":"Akhilesh","family":"Tyagi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Business Software Alliance: Second Annual BSA and IDC Global Software Piracy Study, Trends in software piracy 1994-2004 (May 2005)","key":"13_CR1"},{"doi-asserted-by":"crossref","unstructured":"Lie, D., et al.: Architectural support for copy and tamper resistant software. In: Proceedings of ASPLOS 2000, pp. 168\u2013177 (2000)","key":"13_CR2","DOI":"10.21236\/ADA419599"},{"doi-asserted-by":"crossref","unstructured":"Zhuang, X., et al.: HIDE: An Infrastructure for Efficiently Protecting Information Leakage on the Address Bus. In: Proceedings of ASPLOS 2004 (2004)","key":"13_CR3","DOI":"10.1145\/1024393.1024403"},{"issue":"6","key":"13_CR4","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/32.55090","volume":"16","author":"S.R. White","year":"1990","unstructured":"White, S.R., Comerford, L.: ABYSS: An Architecture for Software Protection. IEEE Transactions on Software Engineering\u00a016(6), 619\u2013629 (1990)","journal-title":"IEEE Transactions on Software Engineering"},{"unstructured":"Kuhn, M.: The TrustNo1 Cryptoprocessor Concept, Technical Report, Purdue University, 1997-04-30","key":"13_CR5"},{"unstructured":"Microsoft. Next-generation secure computing base (2003)","key":"13_CR6"},{"unstructured":"Trusted Computing Platform Alliance. Trusted Platform Module (2003)","key":"13_CR7"},{"unstructured":"TPM Design Principles, Version 1.2. Trusted Platform Module (October 2003)","key":"13_CR8"},{"doi-asserted-by":"crossref","unstructured":"Aucsmith, D.: Tamper Resistant Software: An Implementation. In: Proceedings of the First International Workshop on Information Hiding (1996)","key":"13_CR9","DOI":"10.1007\/3-540-61996-8_49"},{"doi-asserted-by":"crossref","unstructured":"Collberg, C., et al.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering\u00a028(8) (2002)","key":"13_CR10","DOI":"10.1109\/TSE.2002.1027797"},{"issue":"3","key":"13_CR11","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O. Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. Journal of the ACM\u00a043(3), 431\u2013473 (1996)","journal-title":"Journal of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Fredkin, E., Toffoli, T.: Conservative Logic. International Journal of Theoretical Physics\u00a021(3\/4) (April 1982)","key":"13_CR12","DOI":"10.1007\/BF01857727"},{"doi-asserted-by":"crossref","unstructured":"Bennett, R., Landauer, R.: Fundamental Physical Limits of Computation. Scientific American, 48\u201358 (July 1985)","key":"13_CR13","DOI":"10.1038\/scientificamerican0785-48"},{"doi-asserted-by":"crossref","unstructured":"Toffoli, T.: Reversible Computing. Technical Report MIT\/LCS\/TM151\/1980, MIT Laboratory for Computer Science (1980)","key":"13_CR14","DOI":"10.21236\/ADA082021"},{"doi-asserted-by":"crossref","unstructured":"DeHon, A.: DPGA-coupled microprocessor: Commodity ICs for the early 21st centry. In: Proc. of IEEE workshop on FPGAs for Custom Computing Machines, April 1994, pp. 31\u201339 (1994)","key":"13_CR15","DOI":"10.1109\/FPGA.1994.315596"},{"unstructured":"HMAC. Internet RFC 2104 (February 1997)","key":"13_CR16"},{"doi-asserted-by":"crossref","unstructured":"Cvetanovic, Z., et al.: Performance analysis of the Alpha 21264-Based Compaq ES40 System. In: Proc. of ISCA 2000, pp. 192\u2013202 (2000)","key":"13_CR17","DOI":"10.1145\/339647.339680"},{"unstructured":"Intel 80200 Processor based on Intel XSCALE Microarchitecture Datasheet, Intel (January 2003)","key":"13_CR18"},{"unstructured":"Specbench. Spec 2000 Benchmarks","key":"13_CR19"},{"doi-asserted-by":"crossref","unstructured":"Burger, D., Austin, T.M.: The SimpleScalar Tool Set, Version 2.0. Computer Sciences Department Technical report #1342. University of Wisconsin-Madison (June 1997)","key":"13_CR20","DOI":"10.1145\/268806.268810"}],"container-title":["Lecture Notes in Computer Science","High Performance Embedded Architectures and Compilers"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11587514_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:01:30Z","timestamp":1605625290000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11587514_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540303176","9783540322726"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11587514_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}