{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:17:09Z","timestamp":1730222229114,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,8]]},"DOI":"10.1109\/fpl.2007.4380645","type":"proceedings-article","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T16:56:42Z","timestamp":1194973002000},"page":"183-188","source":"Crossref","is-referenced-by-count":0,"title":["Intellectual Property Protection of HDL IP Cores Through Automated Signature Hosting"],"prefix":"10.1109","author":[{"given":"Encarnacion","family":"Castillo","sequence":"first","affiliation":[]},{"given":"Luis","family":"Parrilla","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Lloris","sequence":"additional","affiliation":[]},{"given":"Uwe","family":"Meyer-Baese","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Applied Cryptography","year":"1996","author":"schneier","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2007.896914"},{"key":"ref12","first-page":"480","article-title":"Non-Reversible VHDL Source-Source Encryption","author":"o'brien","year":"1994","journal-title":"Proceedings of the European Conference on Design Automation"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-06728-4","article-title":"Digital Signal Processing with Field Programmable Gate Arrays","author":"meyer-baese","year":"2004"},{"key":"ref14","first-page":"1348","article-title":"Detector-based watermarking technique for soft IP core protection in high synthesis design level","volume":"2","author":"ni","year":"2005","journal-title":"Proc Int Communications Circuits Syst Conf"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/el:20030874"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-36617-2_13","article-title":"Watermarking techniques for electronic circuit design","volume":"2613","author":"charbon","year":"2003","journal-title":"Lecture Notes on Computer Science"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/35.940048"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1145\/277044.277240","article-title":"Watermarking techniques for intellectual property protection","author":"kahng","year":"1998","journal-title":"Proceedings 1998 Design and Automation Conference 35th DAC (Cat No 98CH36175) DAC"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/978-3-540-30114-1_16","article-title":"Soft IP Protection: Watermarking HDL codes","volume":"3200","author":"yuan","year":"2004","journal-title":"6th Information Hiding Workshop"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1139","DOI":"10.1007\/978-3-540-30117-2_149","article-title":"Intellectual Property Protection for RNS Circuits on FPGAs","volume":"3203","author":"parrilla","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"ref7","article-title":"Stego-signature at Logic Synthesis Level for Digital Design IP Protection","author":"cui","year":"2006","journal-title":"Proc IEEE Int Symp on Circuits and Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/196244.196320"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2887-3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2006.311256"}],"event":{"name":"2007 International Conference on Field Programmable Logic and Applications","start":{"date-parts":[[2007,8,27]]},"location":"Amsterdam, Netherlands","end":{"date-parts":[[2007,8,29]]}},"container-title":["2007 International Conference on Field Programmable Logic and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4380601\/4380602\/04380645.pdf?arnumber=4380645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T15:52:43Z","timestamp":1643730763000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4380645\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/fpl.2007.4380645","relation":{},"subject":[],"published":{"date-parts":[[2007,8]]}}}