{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T02:39:13Z","timestamp":1767839953288,"version":"3.49.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/dft.2013.6653617","type":"proceedings-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T14:58:04Z","timestamp":1384181884000},"page":"266-271","source":"Crossref","is-referenced-by-count":31,"title":["Exploiting error control approaches for Hardware Trojans on Network-on-Chip links"],"prefix":"10.1109","author":[{"given":"Qiaoyan","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Frey","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ISED.2011.17"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SBCCI.2012.6344419"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5379966"},{"key":"15","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","article-title":"Transaction briefs-extracting secret keys from integrated circuits","volume":"13","author":"lim","year":"2005","journal-title":"IEEE Trans on Very Large Scale Integr (VLSI) Syst"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536514"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.862745"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.80"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513122"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/NOCS.2007.32"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090726"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SIPS.2005.1579858"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2156436"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2004.1330747"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/2.976921"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2012.2210183"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559047"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"1","author":"ellis","year":"0","journal-title":"Trojan Integrated Circuits"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955011"},{"key":"6","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.179"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2429384.2429392"}],"event":{"name":"2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","location":"New York City, NY, USA","start":{"date-parts":[[2013,10,2]]},"end":{"date-parts":[[2013,10,4]]}},"container-title":["2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6644330\/6653572\/06653617.pdf?arnumber=6653617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T21:45:27Z","timestamp":1498081527000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6653617\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/dft.2013.6653617","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}