{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T07:55:11Z","timestamp":1725782111394},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/isqed.2016.7479226","type":"proceedings-article","created":{"date-parts":[[2016,5,26]],"date-time":"2016-05-26T16:27:41Z","timestamp":1464280061000},"page":"350-355","source":"Crossref","is-referenced-by-count":4,"title":["Trojan detection in digital systems using current sensing of pulse propagation in logic gates"],"prefix":"10.1109","author":[{"given":"Sabyasachi","family":"Deyati","sequence":"first","affiliation":[]},{"given":"Barry J.","family":"Muldrey","sequence":"additional","affiliation":[]},{"given":"Abhijit","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224966"},{"key":"ref11","first-page":"355","article-title":"Efficient Trojan Detection via Calibration of Process Variations","author":"byeongju","year":"2012","journal-title":"Test Symposium (ATS)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.262"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2014.45"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513122"},{"year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2012.2187071"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2008.2006749"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1981.1585361"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484928"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2061228"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224968"},{"key":"ref8","first-page":"51","article-title":"Hardware Trojan detection using path delay fingerprint","author":"yier","year":"2008","journal-title":"Hardware-Oriented Security and Trust 2008 HOST 2008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI.Design.2009.22"},{"key":"ref2","article-title":"Towards Countering the Rise of the Silicon Trojan","author":"anderson","year":"2008","journal-title":"C C C a I Division Ed ed Defence Science and Technology Organisation"},{"journal-title":"Task Force on High Performance Microchip Supply","year":"2005","author":"board","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SCEECS.2014.6804444"}],"event":{"name":"2016 17th International Symposium on Quality Electronic Design (ISQED)","start":{"date-parts":[[2016,3,15]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2016,3,16]]}},"container-title":["2016 17th International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7470728\/7479140\/07479226.pdf?arnumber=7479226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T15:59:13Z","timestamp":1474646353000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7479226\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/isqed.2016.7479226","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}