{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:28:37Z","timestamp":1737437317897,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540752936"},{"type":"electronic","value":"9783540752943"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-75294-3_2","type":"book-chapter","created":{"date-parts":[[2007,9,11]],"date-time":"2007-09-11T14:52:08Z","timestamp":1189522328000},"page":"3-6","source":"Crossref","is-referenced-by-count":0,"title":["Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing?"],"prefix":"10.1007","author":[{"given":"Jean","family":"Arlat","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Vangal, S., Howard, J., Ruhl, G., Dighe, S., Wilson, H., Tschanz, J., Finan, D., Iyer, P., Singh, A., Jacob, T., Jain, S., Venkataraman, S., Hoskote, Y., Borkar, N.: An 80-Tile 1.28TFLOPS Network-on-Chip in 65nm CMOS. In: Proc. IEEE ISSCC-2007, San Francisco, CA, USA, pp. 98\u201399, 589 (2007)","DOI":"10.1109\/ISSCC.2007.373606"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1147\/rd.504.0339","volume":"50","author":"W. Haensch","year":"2006","unstructured":"Haensch, W., Nowak, E.J., Dennard, R.H., Solomon, P.M., Bryant, A., Dokumaci, O.H., Kumar, A., Wang, X., Johnson, J.B., Fischetti, M.V.: Silicon CMOS Devices Beyond Scaling. IBM J. Research and Development\u00a050, 339\u2013361 (2006)","journal-title":"IBM J. Research and Development"},{"key":"2_CR3","unstructured":"Patel, J.H.: Manufacturing Process Variations and Dependability - A Contrarian View. In: Proc. IEEE\/IFIP DSN-2007 (Supplemental Volume), Edinburgh, UK, p. 235 (2007)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Nicola\u00efdis, M., Achouri, N., Anghel, L.: A Diversified Memory Built-In Self-Repair Approach for Nanotechnologies. In: Proc. IEEE VTS-2004, Napa Valley, CA, USA, pp. 313\u2013318 (2004)","DOI":"10.1109\/VTEST.2004.1299258"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Nakura, T., Nose, K., Mizuno, M.: Fine-Grain Redundant Logic Using Defect-Prediction Flip-Flops. In: Proc. IEEE ISSCC-2007, San Francisco, CA, USA, pp. 402\u2013403, 611 (2007)","DOI":"10.1109\/ISSCC.2007.373464"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Li, X., Adve, S.V., Bose, P., Rivers, J.A.: Architecture-Level Soft Error Analysis: Examining the Limits of Common Assumptions. In: Proc. IEEE\/IFIP DSN-2007, Edinburgh, UK, pp. 266\u2013275 (2007)","DOI":"10.1109\/DSN.2007.15"},{"key":"2_CR7","unstructured":"Mason, M.: Cosmic Rays Damage Automotive Electronics. Automotive DesignLine Newsletter (2006)"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MM.2005.119","volume":"25","author":"R.K. Iyer","year":"2005","unstructured":"Iyer, R.K., Nakka, N.M., Kalbarczyk, Z.T., Mitra, S.: Recent Advances and New Avenues in Hardware-level Reliability Support. IEEE Micro\u00a025, 18\u201329 (2005)","journal-title":"IEEE Micro"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Nicola\u00efdis, M.: Time Redundancy Based Soft-Error Tolerance to Rescue Nanometer Technologies. In: Proc. IEEE VTS 1999, San Diego, CA, USA, pp. 86\u201394 (1999)","DOI":"10.1109\/VTEST.1999.766651"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MM.2004.85","volume":"24","author":"D. Ernst","year":"2004","unstructured":"Ernst, D., Das, S., Lee, S., Blaauw, D., Austin, T., Mudge, T., Kim, N.S., Flautner, K.: Razor: Circuit-Level Correction of Timing Errors for Low-Power Operation. IEEE Micro\u00a024, 10\u201320 (2004)","journal-title":"IEEE Micro"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Rao, W., Orailoglu, A., Karri, R.: Fault Tolerant Approaches to Nanoelectronic Programmable Logic Arrays. In: Proc. IEEE\/IFIP DSN-2007, Edinburgh, UK, pp. 216\u2013223 (2007)","DOI":"10.1109\/DSN.2007.49"},{"key":"2_CR12","unstructured":"Constantinescu, C.: Impact of Intermittent Faults on Nanocomputing Devices. In: Proc. IEEE\/IFIP DSN-2007 (Supplemental Volume), Edinburgh, UK, pp. 238\u2013241 (2007)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11894063_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"F.-X. Standaert","year":"2006","unstructured":"Standaert, F.-X., Peeters, E., Archambeau, C., Quisquater, J.-J.: Towards Security Limits in Side-Channel Attacks (With an Application to Block Ciphers). In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 30\u201345. Springer, Heidelberg (2006)"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1109\/TC.2006.143","volume":"55","author":"Y. Monnet","year":"2006","unstructured":"Monnet, Y., Renaudin, M., Leveugle, R.: Designing Resistant Circuits against Malicious Faults Injection Using Asynchronous Logic. IEEE Trans. on Computers\u00a055, 1104\u20131115 (2006)","journal-title":"IEEE Trans. on Computers"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Lee, J., Tehranipoor, M., Patel, C., Plusquellic, J.: Securing Designs Against Scan-Based Side-Channel Attacks. IEEE Trans. on Dependable and Secure Computing (to appear, 2007)","DOI":"10.1109\/TDSC.2007.70215"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Nakka, N., Kalbarczyk, Z.T., Iyer, R.K., Xu, J.: An Architectural Framework for Providing Reliability and Security Support. In: Proc. IEEE\/IFIP DSN-2004, Florence, Italy, pp. 585\u2013594 (2004)","DOI":"10.1109\/DSN.2004.1311929"},{"key":"2_CR17","unstructured":"Handschuh, H.: Security Challenges for High Density Smart Cards. In: Proc. IEEE\/IFIP DSN-2007 (Supplemental Volume), Edinburgh, UK, p. 285 (2007)"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Zaj\u0105c, P., Collet, J.H., Arlat, J., Crouzet, Y.: Resilience through Self-Configuration in Future Massively Defective Nanochips. In: Proc. IEEE\/IFIP DSN-2007 (Supplemental Volume), Edinburgh, UK, pp. 266\u2013271 (2007)","DOI":"10.1109\/IOLTS.2007.56"}],"container-title":["Lecture Notes in Computer Science","Dependable Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75294-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T23:19:14Z","timestamp":1737415154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75294-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540752936","9783540752943"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75294-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}