{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T22:53:33Z","timestamp":1649112813686},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s11623-014-0297-0","type":"journal-article","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T08:20:33Z","timestamp":1415953233000},"page":"742-746","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Kopier- und Manipulationsschutz f\u00fcr eingebettete Systeme"],"prefix":"10.1007","volume":"38","author":[{"given":"Oliver","family":"Schimmel","sequence":"first","affiliation":[]},{"given":"Maxim","family":"Hennig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,6]]},"reference":[{"key":"297_CR1","series-title":"LNCS","first-page":"363","volume-title":"CHES 2009: 11th International Workshop Lausanne, September 6\u20139, 2009, Proceedings","author":"R Torrance","year":"2009","unstructured":"R. Torrance, D. James: The State-of-the-Art in IC Reverse Engineering. In: C. Clavier, K. Gaj (Hrsg.), CHES 2009: 11th International Workshop Lausanne, September 6\u20139, 2009, Proceedings, LNCS 5747, Springer-Verlag, Berlin (2009), 363\u2013381"},{"key":"297_CR2","volume-title":"Schutz eingebetteter Systeme vor Produktpiraterie \u2014 Technologischer Hintergrund und Vorbeugema\u00dfnahmen","author":"B Filipovic","year":"2011","unstructured":"B. Filipovic, O. Schimmel: Schutz eingebetteter Systeme vor Produktpiraterie \u2014 Technologischer Hintergrund und Vorbeugema\u00dfnahmen. Tech. Rep., Fraunhofer AISEC (2011), \n                    http:\/\/www.aisec.fraunhofer.de\/content\/dam\/aisec\/de\/pdf\/studien\/2011-11-15%20Produktschutz-Studie.pdf"},{"key":"297_CR3","unstructured":"WECO: Vergusstechnik. \n                    http:\/\/download.wecogroup.com\/them-en\/de\/WECO_Vergusstechnik.pdf"},{"key":"297_CR4","unstructured":"Flylogic\u2019s Analytical Blog: ST19XL18P \u2014 K5F0A Teardown. \n                    http:\/\/www.flylogic.net\/blog\/?p=289"},{"key":"297_CR5","volume-title":"Tamper respondent enclosure","author":"H Mac Pherson","year":"1999","unstructured":"H. Mac Pherson: Tamper respondent enclosure (1999), Patent: US 5,858,500"},{"key":"297_CR6","volume-title":"Tamper respondent enclosure for an electronic device and electrical assembly utilizing same","author":"A Miglioli","year":"2003","unstructured":"A. Miglioli, V. Ratti, E. Riva, L. Villa: Tamper respondent enclosure for an electronic device and electrical assembly utilizing same (2003), Patent: US 6,512,454 B2"},{"key":"297_CR7","volume-title":"Tamper-responding encapsulated enclosure having flexible protective mesh structure","author":"D S Farquhar","year":"2005","unstructured":"D. S. Farquhar, C. Feger, V. Markovich, K. I. Papathomas, M. D. Poliks, J. M. Shaw, G. Szeparowycz, S. H. Weingart: Tamper-responding encapsulated enclosure having flexible protective mesh structure (2005), Patent: US 6,929,900 B2"},{"key":"297_CR8","volume-title":"Black Hat DC","author":"C Tarnovsky","year":"2010","unstructured":"C. Tarnovsky: Deconstructing a secure processor. In: Black Hat DC, 2010"},{"key":"297_CR9","volume-title":"Attacking and Protecting Ring Oscillator Physical Unclonable Functions and Code-Offset Fuzzy Extractors","author":"D Merli","year":"2014","unstructured":"D. Merli: Attacking and Protecting Ring Oscillator Physical Unclonable Functions and Code-Offset Fuzzy Extractors. M\u00fcnchen, Technische Universit\u00e4t M\u00fcnchen, Dissertation, 2014"},{"key":"297_CR10","volume-title":"DACH","author":"M Hennig","year":"2013","unstructured":"M. Hennig, O. Schimmel, P. Zieris, G. Sigl: Manipulationssensible Kopierschutzfolie. In: DACH 2013, N\u00fcrnberg"},{"key":"297_CR11","volume-title":"Physical One-Way Functions","author":"R Pappu","year":"2001","unstructured":"R. Pappu. Physical One-Way Functions. PhD thesis, Massachusetts Institute of Technology, 2001"},{"key":"297_CR12","doi-asserted-by":"publisher","first-page":"876","DOI":"10.1007\/s11623-012-0294-0","volume":"12","author":"D Merli","year":"2012","unstructured":"D. Merli, G. Sigl: Physical Unclonable Functions \u2014 CMOS-Implementierungen und Hardware-Attacken, In: DuD 12\/2012, 876\u2013880","journal-title":"DuD"},{"key":"297_CR13","first-page":"281","volume-title":"IEEE Symposium on Security and Privacy","author":"S Drimer","year":"2008","unstructured":"S. Drimer, S. Murdoch, R. Anderson: Thinking inside the box: system-level failures of tamper proofing, In: IEEE Symposium on Security and Privacy 2008, 281\u2013295"},{"key":"297_CR14","unstructured":"P. Isaacs, T. Morris Jr, M.J. Fisher and K. Cuthbert, Tamper Proof, Tamper Evident Encryption Technology, In: SMTA Proceedings"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0297-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0297-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0297-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0297-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:22:44Z","timestamp":1559398964000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0297-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":14,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["297"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0297-0","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11]]}}}