{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:09:19Z","timestamp":1729652959763,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isicir.2014.7029471","type":"proceedings-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T09:52:27Z","timestamp":1423561947000},"page":"608-611","source":"Crossref","is-referenced-by-count":3,"title":["Obfuscation and watermarking of FPGA designs based on constant value generators"],"prefix":"10.1109","author":[{"given":"Vladimir V.","family":"Sergeichik","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexander A.","family":"Ivaniuk","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chip-Hong","family":"Chang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"ISCAS High-Level Models","year":"0","key":"19"},{"journal-title":"Using Look-up Tables As Shift Registers (SRL16) in Spartan-3","year":"0","key":"17"},{"journal-title":"OpenCores Mode of Access","year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2039370.2039414"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2008.4762385"},{"key":"13","doi-asserted-by":"crossref","first-page":"152","DOI":"10.4156\/jcit.vol6.issue8.18","article-title":"A dfa-based distributed ip watermarking method using data compression technique","volume":"6","author":"xu","year":"2011","journal-title":"J Convergence Inform Technol"},{"key":"14","first-page":"272","article-title":"Evaluation of spatial complexity metrics of object oriented software","volume":"2","author":"kumar","year":"2012","journal-title":"Int J Emerging Tech Advanced Engineering"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2009.2035415"},{"journal-title":"Design of Embedded Digital Systems and Devices","year":"2012","author":"ivaniuk","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1117\/12.884142"},{"journal-title":"A Taxonomy of Obfuscating Transformations","year":"1997","author":"collberg","key":"2"},{"journal-title":"Hardware Security Through Design Obfuscation","year":"2010","author":"chakraborty","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2006.270313"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1134\/S1063739712070037"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581566"},{"journal-title":"Anti-Counterfeit and Anti-Tamper Implementation Using Hardware Obfuscation","year":"2013","author":"desai","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CISIM.2007.51"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2010.2098131"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.32"}],"event":{"name":"2014 International Symposium on Integrated Circuits (ISIC)","start":{"date-parts":[[2014,12,10]]},"location":"Singapore","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 International Symposium on Integrated Circuits (ISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7005969\/7029433\/07029471.pdf?arnumber=7029471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:16:40Z","timestamp":1498180600000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7029471\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/isicir.2014.7029471","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}