{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:29:55Z","timestamp":1725913795550},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811058608"},{"type":"electronic","value":"9789811058615"}],"license":[{"start":{"date-parts":[[2017,10,17]],"date-time":"2017-10-17T00:00:00Z","timestamp":1508198400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-5861-5_9","type":"book-chapter","created":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T04:59:44Z","timestamp":1508129984000},"page":"193-216","source":"Crossref","is-referenced-by-count":1,"title":["Study on IP Protection Techniques for Integrated Circuit in IOT Environment"],"prefix":"10.1007","author":[{"given":"Wei","family":"Liang","sequence":"first","affiliation":[]},{"given":"Jing","family":"Long","sequence":"additional","affiliation":[]},{"given":"Dafang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yin","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,17]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Koushanfar F, Fazzari S, McCants C, et al. 2012. Can EDA combat the rise of electronic counterfeiting? In Proceedings of 2012 49th ACM\/EDAC\/IEEE design automation conference (DAC), 133\u2013138.","DOI":"10.1145\/2228360.2228386"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Majzoobi M, Koushanfar F, Devadas S. 2010. FPGA PUF using Programmable Delay Lines. In Proceedings of information forensics and security (WIFS), 51\u201365.","DOI":"10.1109\/WIFS.2010.5711471"},{"key":"9_CR3","unstructured":"Guajardo J, Guneysu T, Kumar S S, et al. 2009. Secure IP-block distribution for hardware devices. In IEEE international workshop on hardware-oriented security and trust, 82\u201389."},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Kirovski D, Potkonjak M. Local watermarks: Methodology and application to behavioral synthesis. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 1277\u20131283.","DOI":"10.1109\/TCAD.2003.816208"},{"key":"9_CR5","unstructured":"Marsh C, Kean T. 2007. A security tagging scheme for ASIC designs and intellectual property cores. Design & Reuse, 57\u201364."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Goren S, Ugurdag H F, Yildiz A ,Ozkurt O. 2010. FPGA design security with time division multiplexed PUFs. In Proceedings of international conference on high performance computing and simulation (HPCS), 608\u2013614.","DOI":"10.1109\/HPCS.2010.5547067"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Lach J, Mangione W H, Potkonjak M. 2001. Fingerprinting techniques for field-programmable gate array intellectual property protection. IEEE transactions on computer-aided design of integrated circuits and systems, 1253\u20131261","DOI":"10.1109\/43.952741"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Guneysu T, Moller B, Paar C. 2007. Dynamic intellectual property protection for reconfigurable devices. In Proceedings of the 15th annual IEEE symposium on FPT, 287\u2013288","DOI":"10.1109\/FPT.2007.4439246"},{"key":"9_CR9","unstructured":"Li, D., W. Zheng, and M. Zhang. 2007. Development of IP watermarking techniques. Journal of Circuit and Systems 12(4): 84\u201392."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Roy J A, Koushanfar F, Markov I L. 2008. EPIC: Ending piracy of integrated circuits. In Proceedings of the conference on design, Europe, 1069\u20131074.","DOI":"10.1145\/1403375.1403631"},{"key":"9_CR11","unstructured":"Yip K, Ng T. 2000. Partial-encryption technique for intellectual property protection of FPGA-based products. IEEE Transactions on Consumer Electronics, 183\u2013190."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Nie T, Liu H, Zhou L. 2012. A time-constrained watermarking technique on FPGA. In Proceedings of 2012 international conference on industrial control and electronics engineering (ICICEE), 795\u2013798.","DOI":"10.1109\/ICICEE.2012.212"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Khan M and Tragoudas S. 2005. Rewiring for watermarking digital circuit netlists. IEEE transactions on computer-aided design of integrated circuits and systems, 1132\u20131137.","DOI":"10.1109\/TCAD.2005.850855"},{"key":"9_CR14","unstructured":"Liang, W., X. Sun, Z. Xia, and J. Long. 2011. A chaotic IP watermarking in physical layout level based on FPGA. Radioengineering 20(1): 118\u2013125."},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Liang, W., K. Wu, H. Zhou, and Y. Xie. 2015. TDCM: An IP watermarking algorithm based on two-dimensional chaotic mapping. Computer Science and Information Systems 12(2): 823\u2013841.","DOI":"10.2298\/CSIS141017028L"},{"key":"9_CR16","unstructured":"Liang W, Long J, Chen X, Xiao W. 2016. Publicly verifiable blind detection for intellectual property watermarks through zero-knowledge protocol. International Journal of System Assurance Engineering and Management, 738\u2013981."},{"key":"9_CR17","unstructured":"Xu J B, Long J, Liang W. 2011. A DFA-based distributed IP watermarking method using data compression technique. Journal of Convergence Information Technology, 152\u2013160."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Raj N, Josprakash, et al. 2011. Behavioral level watermarking techniques for IP identification based on testing in SOC design. In Proceedings of international conference on information technology and mobile communication, 485\u2013488.","DOI":"10.1007\/978-3-642-20573-6_88"},{"key":"9_CR19","unstructured":"Castillo E, Meyer-Baese U, Garc\u00eda A. 2007. IPP@HDL: Efficient intellectual property protection scheme for IP cores. IEEE Transactions on VLSI Systems, 578\u2013591."},{"key":"9_CR20","unstructured":"Sun, X., M. Zhang, and H. Zhang. 2013. Two-Dimension Chaotic-Multivariate Signature System 10(1). 1694\u20130814."},{"key":"9_CR21","unstructured":"Basu, A., D.B. Roy, and D. Banerjee. 2011. FPGA implementation of IP protection through visual information hiding. International Journal of Engineering Science and Technology 3(5): 4191\u20134199."},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Torunoglu I, Charbon E. 2000. Watermarking-based copyright protection of sequential functions. IEEE Journal of Solid-State Circuits, 434\u2013440.","DOI":"10.1109\/4.826826"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Oliveira A L. 2001. Techniques for the creation of digital watermarks in sequential circuit designs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 1101\u20131117.","DOI":"10.1109\/43.945306"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Abdel-Hamid A T, Tahar S. 2008. Fragile IP watermarking techniques. In Proceedings of NASA\/ESA conference on adaptive hardware and systems. Noordwijk, 513\u2013519.","DOI":"10.1109\/AHS.2008.73"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Cui A, Chang C H, Tahar S. 2008. IP watermarking using incremental technology mapping at logic synthesis level. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 1565\u20131570.","DOI":"10.1109\/TCAD.2008.927732"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Yuan L and Qu G. 2004. Information hiding in finite state machine. In Information hiding workshop, 340\u2013354.","DOI":"10.1007\/978-3-540-30114-1_24"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Abdel-Hamid A T, Tahar S, and Aboulhamid E M. 2006. Finite state machine IP watermarking: A tutorial. In Proceedings of the first NASA\/ESA conference on adaptive hardware and systems (AHS\u201906), 457\u2013464.","DOI":"10.1109\/AHS.2006.40"},{"key":"9_CR28","unstructured":"Fan Y. 2008. Testing-based watermarking techniques for intellectual-property identification in SOC design. IEEE Transactions on Instrumentation and Measurement, 467\u2013479."},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Saha D, Sur-Kolay S. 2010. A unified approach for IP protection across design phases in a packaged chip. In Proceedings of 23rd international conference on VLSI design, 105\u2013110.","DOI":"10.1109\/VLSI.Design.2010.52"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Cui A, Chang C H. 2012. A post-processing scan-chain watermarking scheme for VLSI intellectual property protection. In Proceedings of 2012 IEEE Asia pacific conference on circuits and systems (APCCAS), 412\u2013415.","DOI":"10.1109\/APCCAS.2012.6419059"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Khan, M., and S. Tragoudas. 2005. Rewiring for watermarking digital circuit netlists. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 24(7): 1132\u20131137.","DOI":"10.1109\/TCAD.2005.850855"},{"key":"9_CR32","unstructured":"Cui, A., Chang, C. H. 2008. Intellectual property authentication by watermarking scan chain in design-for-testability flow. In Proceedings of International Symposium on CAS, 2645\u20132648."},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Kirovski, D., Y.Y. Hwang, et al. 2006. Protecting combinational logic synthesis solutions. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 25(12): 2687\u20132696.","DOI":"10.1109\/TCAD.2006.882490"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Xu, J., Y. Sheng, W. Liang, L. Peng, and J. Long. 2016. A high polymeric mutual mapping IP watermarking algorithm for FPGA design. Journal of Computational and Theoretical Nanoscience 13(1): 186\u2013193.","DOI":"10.1166\/jctn.2016.4788"}],"container-title":["Internet of Things","Internet of Everything"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5861-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T05:08:07Z","timestamp":1508130487000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5861-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,17]]},"ISBN":["9789811058608","9789811058615"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5861-5_9","relation":{},"ISSN":["2199-1073","2199-1081"],"issn-type":[{"type":"print","value":"2199-1073"},{"type":"electronic","value":"2199-1081"}],"subject":[],"published":{"date-parts":[[2017,10,17]]}}}