{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:35:08Z","timestamp":1730223308851,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/giots.2019.8766426","type":"proceedings-article","created":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T23:46:38Z","timestamp":1563839198000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Rekeying-based Moving Target Defence Mechanism for Side-Channel Attacks"],"prefix":"10.1109","author":[{"given":"Satyanarayana","family":"Vuppala","sequence":"first","affiliation":[]},{"given":"Alie El-Din","family":"Mady","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Kuenzi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_27"},{"key":"ref3","first-page":"56","article-title":"A block cipher based PRNG secure against side-channel key recovery","author":"petit","year":"2008","journal-title":"Proceedings of ASIACCS 2008"},{"key":"ref10","first-page":"249","article-title":"Intelligent machine homicide - breaking cryptographic devices using support vector machines","author":"heuser","year":"2012","journal-title":"In COSADE volume 7275 of LNCS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176671"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10175-0_17"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12678-9_17"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593193"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0089-3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2757440"},{"key":"ref1","first-page":"98","article-title":"Multiplicative masking and power analysis of AES","volume":"2523","author":"golic","year":"2002","journal-title":"CHES 2002"}],"event":{"name":"2019 Global IoT Summit (GIoTS)","start":{"date-parts":[[2019,6,17]]},"location":"Aarhus, Denmark","end":{"date-parts":[[2019,6,21]]}},"container-title":["2019 Global IoT Summit (GIoTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8764050\/8766345\/08766426.pdf?arnumber=8766426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:25:13Z","timestamp":1658262313000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8766426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/giots.2019.8766426","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}