{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:58:28Z","timestamp":1725659908866},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/idt.2015.7396749","type":"proceedings-article","created":{"date-parts":[[2016,2,4]],"date-time":"2016-02-04T16:56:52Z","timestamp":1454605012000},"page":"129-134","source":"Crossref","is-referenced-by-count":6,"title":["Facilitating side channel analysis by obfuscation for Hardware Trojan detection"],"prefix":"10.1109","author":[{"given":"Arash","family":"Nejat","sequence":"first","affiliation":[]},{"given":"David","family":"Hely","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Beroulle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"ref11","first-page":"192","article-title":"A Resizing Method to Minimize Effects of Hardware Trojans. In Test Symposium (ATS)","author":"cha","year":"2014","journal-title":"2014 IEEE 23rd Asian"},{"journal-title":"Verific Design Automation","year":"0","key":"ref12"},{"journal-title":"Politecnico di Torino ITC'99 benchkmarks","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2015.54"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI.Design.2010.54"},{"journal-title":"Synopsys Formality solution","year":"0","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2014.01.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2164908"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559047"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2014.6873671"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.262"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CADS.2013.6714240"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt.2014.0028"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2015.02.002"}],"event":{"name":"2015 10th International Design & Test Symposium (IDT)","start":{"date-parts":[[2015,12,14]]},"location":"Amman","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 10th International Design &amp; Test Symposium (IDT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7383418\/7396715\/07396749.pdf?arnumber=7396749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T08:54:06Z","timestamp":1490086446000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7396749\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/idt.2015.7396749","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}