{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T23:12:20Z","timestamp":1723072340683},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/ipdps.2008.4536514","type":"proceedings-article","created":{"date-parts":[[2008,6,6]],"date-time":"2008-06-06T12:44:52Z","timestamp":1212756292000},"source":"Crossref","is-referenced-by-count":27,"title":["Implementation of a reconfigurable data protection module for NoC-based MPSoCs"],"prefix":"10.1109","author":[{"given":"Leandro","family":"Fiorin","sequence":"first","affiliation":[]},{"given":"Slobodan","family":"Lukovic","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Palermo","sequence":"additional","affiliation":[]},{"given":"Politecnico","family":"di Milano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"xilinx","year":"2005","journal-title":"Embedded System Tools Reference Manual Embedded Development Kit EDK 8 1i"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.91"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2005.864128"},{"key":"15","first-page":"162","article-title":"security wrappers and power analysis for soc technology","author":"gebotys","year":"2003","journal-title":"First IEEE\/ACM\/IFIP International Conference on CODES+ISSS"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2005.1515777"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2007.4341520"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2003.1183361"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SIPS.2005.1579858"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1289816.1289858"},{"key":"3","author":"alves","year":"2004","journal-title":"TrustZone Integrated Hardware and Software Security"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/AHS.2006.25"},{"key":"1","year":"0","journal-title":"SonicsMX SMART Interconnect Datasheet"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/NOCS.2007.32"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1086297.1086308"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/2.976921"},{"key":"5","first-page":"1024","article-title":"a dynamic noc approach for communication in reconfigurable devices","author":"bobda","year":"2004","journal-title":"Proc Int'l Conf Field-Programmable Logic and Applications (FPL 04)"},{"key":"4","author":"chien","year":"2002","journal-title":"Blended Attacks Exploits Vulnerabilities and Buffer Overflow Techniques in Computer Viruses"},{"key":"9","author":"de micheli","year":"2006","journal-title":"Networks on Chip"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/378239.379048"}],"event":{"name":"Distributed Processing Symposium (IPDPS)","location":"Miami, FL, USA","start":{"date-parts":[[2008,4,14]]},"end":{"date-parts":[[2008,4,18]]}},"container-title":["2008 IEEE International Symposium on Parallel and Distributed Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4519061\/4536075\/04536514.pdf?arnumber=4536514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T11:08:28Z","timestamp":1489662508000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4536514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2008.4536514","relation":{},"ISSN":["1530-2075"],"issn-type":[{"value":"1530-2075","type":"print"}],"subject":[],"published":{"date-parts":[[2008,4]]}}}