{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:27:41Z","timestamp":1760984861066},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/hst.2013.6581565","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:14:00Z","timestamp":1377710040000},"page":"51-54","source":"Crossref","is-referenced-by-count":19,"title":["A bulk built-in sensor for detection of fault attacks"],"prefix":"10.1109","author":[{"given":"R. Possamai","family":"Bastos","sequence":"first","affiliation":[]},{"given":"F. Sill","family":"Torres","sequence":"additional","affiliation":[]},{"given":"J.-M.","family":"Dutertre","sequence":"additional","affiliation":[]},{"given":"M.-L.","family":"Flottes","sequence":"additional","affiliation":[]},{"given":"G.","family":"Di Natale","sequence":"additional","affiliation":[]},{"given":"B.","family":"Rouzeyre","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/1081081.1081103"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1016\/j.microrel.2008.01.002"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/ICCD.2005.15"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/ISQED.2009.4810395"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/FTCS.1994.315652"},{"key":"14","first-page":"592","article-title":"An efficient bics design for seus detection and correction in semiconductor memories","author":"gill","year":"2005","journal-title":"Proc DATE"},{"key":"11","first-page":"118","article-title":"A novel built-in current sensor for iddq testing of deep submicron cmos ics","author":"athan","year":"1996","journal-title":"Proc VTS"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/FTCS.1992.243610"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/TEST.2007.4437631"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/TC.2007.1078"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/TDSC.2004.14"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/TDMR.2013.2252176"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/MM.2006.103"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1016\/j.microrel.2012.06.149"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/SBCCI.2012.6344422"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/RADECS.2011.6131361"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1007\/s10836-013-5364-1"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/TNS.2008.920426"}],"event":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2013,6,2]]},"location":"Austin, TX, USA","end":{"date-parts":[[2013,6,3]]}},"container-title":["2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6573517\/6581554\/06581565.pdf?arnumber=6581565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T23:55:24Z","timestamp":1490226924000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6581565\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/hst.2013.6581565","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}