{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:39:07Z","timestamp":1729618747165,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/hst.2014.6855575","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T16:26:31Z","timestamp":1406651191000},"page":"88-92","source":"Crossref","is-referenced-by-count":5,"title":["Robust keys from physical unclonable functions"],"prefix":"10.1109","author":[{"given":"Merrielle","family":"Spain","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Fuller","sequence":"additional","affiliation":[]},{"given":"Kyle","family":"Ingols","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Cunningham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.2307\/2289860"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/18.57199"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.884092"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1080\/14786440109462720"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316436","author":"rao","year":"1973","journal-title":"Linear Statistical Inference Its Applications"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513105"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.10"},{"key":"7","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"guajardo","year":"2007","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2007"},{"key":"6","first-page":"369","article-title":"Read-proof hardware from protective coatings","author":"tuyls","year":"2006","journal-title":"CHES"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559053"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513108"},{"journal-title":"Physical random functions","year":"2003","author":"gassend","key":"9"},{"key":"8","first-page":"277","article-title":"On the foundations of physical unclonable functions","volume":"2009","author":"ruhrmair","year":"2009","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2014,5,6]]},"location":"Arlington, VA, USA","end":{"date-parts":[[2014,5,7]]}},"container-title":["2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6847848\/6855557\/06855575.pdf?arnumber=6855575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:31:50Z","timestamp":1498138310000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6855575\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/hst.2014.6855575","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}