{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:14:10Z","timestamp":1730265250393,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/igcc.2018.8752109","type":"proceedings-article","created":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T23:34:42Z","timestamp":1562024082000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Survey on Energy Efficiency Techniques for Secure Computing Systems"],"prefix":"10.1109","author":[{"given":"Zhiming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2013.6815488"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383907"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2591513.2591520"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-016-5598-9"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.vlsi.2016.06.008","article-title":"A hardened network-on-chip design using runtime hardware trojan mitigation methods","volume":"56","author":"frey","year":"2017","journal-title":"Integr VLSI J"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SIPS.2005.1579858"},{"key":"ref10","first-page":"64","article-title":"Power attack resistant cryptosystem design: a dynamic voltage and frequency switching approach","volume":"3","author":"yang","year":"2005","journal-title":"Proc DATE"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2620382"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2331553"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736864"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2015.2435532"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2011.6127174"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2018.40"},{"key":"ref18","first-page":"336","article-title":"Volta: Voltage over-scaling based lightweight authentication for iot applications","author":"arafin","year":"2017","journal-title":"Proc ASP-DAC"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.176"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263951"},{"journal-title":"Systems computing challenges in the Internet of Things","year":"0","author":"alur","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593167"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2435227.2435262"},{"year":"0","key":"ref6","article-title":"Energy-efficient computing systems, dynamic adaptation of quality of service and approximate computing"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228536"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/NATSYS.2015.7489088"},{"journal-title":"Security Opportunities in Nano Devices and Emerging Technologies","year":"2018","author":"tehranipoor","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2018.2794070"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2697960"},{"key":"ref9","first-page":"30","article-title":"Circuit-level techniques for reliable physically uncloneable functions","author":"vivekraja","year":"2009","journal-title":"Proc HOST"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"ref20","first-page":"62","article-title":"High efficiency power side-channel attack immunity using noise injection in attenuated signature domain","author":"das","year":"2017","journal-title":"Proc HOST"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2550460"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.54"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2380445.2380515"},{"key":"ref23","first-page":"1","article-title":"Catching the flu: Emerging threats from a third party power management unit","author":"jayashankarashridevi","year":"2016","journal-title":"Proc DAC"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2007.59"},{"key":"ref25","first-page":"33","article-title":"Generic side-channel counter-measures for reconfigurable devices","author":"g\u00fcneysu","year":"2011","journal-title":"Proc CHES"}],"event":{"name":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","start":{"date-parts":[[2018,10,22]]},"location":"Pittsburgh, PA, USA","end":{"date-parts":[[2018,10,24]]}},"container-title":["2018 Ninth International Green and Sustainable Computing Conference (IGSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8744145\/8752106\/08752109.pdf?arnumber=8752109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T17:54:14Z","timestamp":1643306054000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8752109\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/igcc.2018.8752109","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}