{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:09:40Z","timestamp":1725577780082},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,15]]},"DOI":"10.1109\/icicdt51558.2021.9626514","type":"proceedings-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T20:29:35Z","timestamp":1638476975000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["Deterministic Tagging Technology for Device Authentication"],"prefix":"10.1109","author":[{"given":"Jungjoon","family":"Ahn","sequence":"first","affiliation":[]},{"given":"Jihong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Joseph J.","family":"Kopanski","sequence":"additional","affiliation":[]},{"given":"Yaw S.","family":"Obeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1088\/0957-4484\/20\/30\/305705"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICCAD.2010.5654245"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1126\/science.1100731"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.adhoc.2013.05.003"},{"key":"ref14","article-title":"Authentication article and process for making same","author":"obeng","year":"0","journal-title":"US Patent Number"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TNANO.2002.1005425"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/s00339-006-3497-0"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1063\/1.3622141"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1038\/nature04086"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1088\/0034-4885\/68\/12\/R01"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1063\/1.5065385"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1103\/PhysRevLett.97.206805"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1149\/07203.0113ecst"},{"key":"ref1","first-page":"1535","article-title":"Hardware Security Through Chain Assurance","author":"yaw obeng","year":"2016","journal-title":"Design Automation Test in Europe Conference Exhibition (DATE)"},{"year":"2013","author":"prati","journal-title":"Single Atom Nanoelectronics","key":"ref9"}],"event":{"name":"2021 International Conference on IC Design and Technology (ICICDT)","start":{"date-parts":[[2021,9,15]]},"location":"Dresden, Germany","end":{"date-parts":[[2021,9,17]]}},"container-title":["2021 International Conference on IC Design and Technology (ICICDT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9626390\/9626391\/09626514.pdf?arnumber=9626514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:53:57Z","timestamp":1652201637000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9626514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icicdt51558.2021.9626514","relation":{},"subject":[],"published":{"date-parts":[[2021,9,15]]}}}