{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:42:37Z","timestamp":1730274157507,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isicir.2014.7029479","type":"proceedings-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T09:52:27Z","timestamp":1423561947000},"page":"320-323","source":"Crossref","is-referenced-by-count":2,"title":["A dynamic-voltage-scaling 1kbyte&amp;#x00D7;8-bit non-imprinting Master-Slave SRAM with high speed erase for low-power operation"],"prefix":"10.1109","author":[{"given":"Weng-Geng","family":"Ho","sequence":"first","affiliation":[]},{"given":"Kwen-Siong","family":"Chong","sequence":"additional","affiliation":[]},{"given":"Bah-Hwee","family":"Gwee","sequence":"additional","affiliation":[]},{"given":"Joseph S.","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Ne Kyaw Zwa","family":"Lwin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"359","volume":"1 b","author":"trimberger","year":"2013","journal-title":"System and Method of Detecting and Reversing Data Imprinting in Memory"},{"key":"2","first-page":"1","article-title":"Security strategy of powered-off SRAM for resisting physical attack to data remanence","volume":"30","author":"yu","year":"2009","journal-title":"Journal of Semiconductors"},{"key":"10","first-page":"573","article-title":"An ultra-low power asynchronous-logic in-situ self-adaptive VDD system for wireless sensor network","volume":"48","author":"lin","year":"2013","journal-title":"IEEE JSSC"},{"key":"1","first-page":"525","volume":"b2","author":"backus","year":"2009","journal-title":"Nonimprinting Memory with High Speed Erase"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/JETCAS.2011.2159284"},{"key":"6","first-page":"953","volume":"2 b","author":"buscaglia","year":"2011","journal-title":"Protection of Secure Electronic Modules Against Attacks"},{"year":"2012","author":"pedersen","journal-title":"Systems and Methods for Preventing Data Remanence in Memory Systems","key":"5"},{"year":"2006","author":"furusawa","journal-title":"High-assurance Processor Active Memory Content Protection","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/JPROC.2006.875789"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/JSSC.2011.2181678"}],"event":{"name":"2014 International Symposium on Integrated Circuits (ISIC)","start":{"date-parts":[[2014,12,10]]},"location":"Singapore","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 International Symposium on Integrated Circuits (ISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7005969\/7029433\/07029479.pdf?arnumber=7029479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:56:41Z","timestamp":1490302601000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7029479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isicir.2014.7029479","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}