{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:50:57Z","timestamp":1729608657694,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949402","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T15:55:21Z","timestamp":1310572521000},"page":"39-46","source":"Crossref","is-referenced-by-count":0,"title":["Security fusion based on state machine compositions"],"prefix":"10.1109","author":[{"given":"Omar","family":"Al Ibrahim","sequence":"first","affiliation":[]},{"given":"Suku","family":"Nair","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.26"},{"key":"ref32","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"0","journal-title":"ACM IEEE Design Automation Conference"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1531542.1531639"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1502781.1502786"},{"key":"ref35","first-page":"262","author":"frikken","year":"2009","journal-title":"Robust authentication using physically unclonable functions"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2009.12"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"ref12","first-page":"1839","article-title":"Strong crypto for RFID tags - a comparison of low per hardware implementations","author":"feldhofer","year":"0","journal-title":"IEEE International Symposium on Circuits and Systems"},{"key":"ref13","first-page":"292","article-title":"Mutual authentication in RFID: security and privacy","author":"praise","year":"0","journal-title":"ACM Symposium on Information computer and communications security"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1201\/9781420052824","author":"yan","year":"2008","journal-title":"The Internet of Things"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359563"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISWPC.2006.1613621"},{"key":"ref17","article-title":"A Novel Design of Secure RFID Tag Baseband","author":"yu","year":"0","journal-title":"Proceedings of EU RFID Forum"},{"key":"ref18","first-page":"299","article-title":"Related key differential attacks on 26 rounds of XTEA and full rounds of GOST","author":"youngdai","year":"0","journal-title":"Proceedings of Fast Software Encryption Lecture Notes in Computer Science"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1137\/0215025"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.37"},{"journal-title":"Practical Cryptography","year":"2003","author":"ferguson","key":"ref27"},{"key":"ref3","first-page":"363366","article-title":"TEA, a tiny encryption algorithm","author":"wheeler","year":"0","journal-title":"Fast Software Encryption Second International Workshop Lecture Notes in Computer Science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.77"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1531542.1531639"},{"key":"ref5","first-page":"62","article-title":"A key predistribution scheme for sensor networks using deployment knowledge","author":"du","year":"2006","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.51"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MWC.2004.1368895","article-title":"Designing Secure Sensor Networks","volume":"11","author":"shai","year":"2004","journal-title":"IEEE Wireless Communication"},{"key":"ref2","first-page":"372","article-title":"A case against currently used hash functions in RFID protocols","author":"feldhofer","year":"0","journal-title":"OTM 2006 Workshops"},{"key":"ref9","first-page":"1411","article-title":"A Key Management Scheme Using deployment knowledge for wireless sensor networks","author":"yu","year":"2008","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-3-540-85053-3_18","article-title":"Hash functions and RFID tags: mind the gap","author":"bogdanov","year":"2008","journal-title":"CHES 2008 - Cryptographic Hardware and Embedded Systems"},{"journal-title":"Security fusion security for resource-constrained environments","year":"2011","author":"nair","key":"ref20"},{"journal-title":"Finite-State Models for Logical Machines","year":"1968","author":"hennie","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511525889"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"674","DOI":"10.1145\/343647.343890","article-title":"Logic simulation using networks of state machines","author":"maurer","year":"0","journal-title":"Proceedings of the conference on Design Automation and Test in Europe"},{"key":"ref23","first-page":"124","author":"balasubramanian","year":"2008","journal-title":"Fault tolerance in finite state machines using fusion"},{"journal-title":"General Accounting Office (GAO) GAO-04&#x2013;354","year":"2004","key":"ref26"},{"key":"ref25","first-page":"160","article-title":"SCADA systems: vulnerabilities and remediation","volume":"20","author":"famendez","year":"2005","journal-title":"Journal of Computing Sciences in Colleges"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949402.pdf?arnumber=5949402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T23:39:57Z","timestamp":1560382797000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949402\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949402","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}