{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:10:50Z","timestamp":1725707450095},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,17]],"date-time":"2023-12-17T00:00:00Z","timestamp":1702771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,17]],"date-time":"2023-12-17T00:00:00Z","timestamp":1702771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,17]]},"DOI":"10.1109\/icm60448.2023.10378911","type":"proceedings-article","created":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T19:29:06Z","timestamp":1704482946000},"page":"149-152","source":"Crossref","is-referenced-by-count":0,"title":["Secured and Optimized Hardware Accelerators using Key-Controlled Encoded Hash Slices and Firefly Algorithm based Exploration"],"prefix":"10.1109","author":[{"given":"Anirban","family":"Sengupta","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Indore, Indian Statistical Institute Kolkata,Computer Science and Engg,India"}]},{"given":"Aditya","family":"Anshul","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Indore,Computer Science and Engg,India"}]},{"given":"Chirag","family":"Kothari","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Indore,India"}]},{"given":"Sumer","family":"Thakur","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Indore,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/les.2017.2774800"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2021.3105113"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3174349"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1080334.1080338"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/spl.2008.4547753"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CECNET.2011.5768190"},{"year":"2023","key":"ref7","article-title":"Open Cell NanGate Library, 15 nm open cell library"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2023.3265559"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-012-9085-y"}],"event":{"name":"2023 International Conference on Microelectronics (ICM)","start":{"date-parts":[[2023,12,17]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,12,20]]}},"container-title":["2023 International Conference on Microelectronics (ICM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10378847\/10378878\/10378911.pdf?arnumber=10378911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T04:37:42Z","timestamp":1706071062000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10378911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,17]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icm60448.2023.10378911","relation":{},"subject":[],"published":{"date-parts":[[2023,12,17]]}}}