{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:56:26Z","timestamp":1762005386980},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T00:00:00Z","timestamp":1637625600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T00:00:00Z","timestamp":1637625600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,23]]},"DOI":"10.1109\/nca53618.2021.9685239","type":"proceedings-article","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T22:34:15Z","timestamp":1643668455000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking"],"prefix":"10.1109","author":[{"given":"Sameh","family":"Khalfaoui","sequence":"first","affiliation":[{"name":"EDF R&#x0026;D,Palaiseau,France"}]},{"given":"Jean","family":"Leneutre","sequence":"additional","affiliation":[{"name":"Institut Polytechnique de Paris,LTCI, T&#x00E9;l&#x00E9;com Paris,Palaiseau,France"}]},{"given":"Arthur","family":"Villard","sequence":"additional","affiliation":[{"name":"EDF R&#x0026;D,Palaiseau,France"}]},{"given":"Ivan","family":"Gazeau","sequence":"additional","affiliation":[{"name":"EDF R&#x0026;D,Palaiseau,France"}]},{"given":"Jingxuan","family":"Ma","sequence":"additional","affiliation":[{"name":"EDF R&#x0026;D,Palaiseau,France"}]},{"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[{"name":"Institut Polytechnique de Paris,LTCI, T&#x00E9;l&#x00E9;com Paris,Palaiseau,France"}]},{"given":"Pascal","family":"Urien","sequence":"additional","affiliation":[{"name":"Institut Polytechnique de Paris,LTCI, T&#x00E9;l&#x00E9;com Paris,Palaiseau,France"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463193"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9101715"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2131133"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2370531"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107593"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2016.2638445"},{"key":"ref16","article-title":"Robust and undetectable white-box watermarks for deep neural networks","author":"wang","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref17","first-page":"1615","article-title":"Turning your weakness into a strength: Watermarking deep neural networks by backdooring","author":"adi","year":"2018","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref18","first-page":"237","article-title":"Modeling attacks on physical unclonable functions","author":"r\u00fchrmair","year":"2010","journal-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security"},{"key":"ref19","first-page":"696","article-title":"The tamarin prover for the symbolic analysis of security protocols","author":"meier","year":"2013","journal-title":"International Conference on Computer Aided Verification"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2015.117"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3098496"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.97-120"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i4.243-290"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.06.047"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.30"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3098224"},{"journal-title":"Transitive trust enrollment for con-strained devices","year":"2012","author":"jennings","key":"ref9"},{"key":"ref1","first-page":"85","author":"guin","year":"2018","journal-title":"A secure low-cost edge device authentication scheme for the internet of things"},{"key":"ref20","first-page":"293","article-title":"Self-secured puf: protecting the loop puf by masking","author":"tebelmann","year":"2020","journal-title":"Constructive Side-Channel Analysis and Secure Design"},{"journal-title":"pypuf Cryptanalysis of Physically Unclonable Functions","year":"2021","author":"wisiol","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3376122"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1362-2_11"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.3028508"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2018.8494884"}],"event":{"name":"2021 IEEE 20th International Symposium on Network Computing and Applications (NCA)","start":{"date-parts":[[2021,11,23]]},"location":"Boston, MA, USA","end":{"date-parts":[[2021,11,26]]}},"container-title":["2021 IEEE 20th International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9685017\/9685042\/09685239.pdf?arnumber=9685239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:10:41Z","timestamp":1656965441000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9685239\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,23]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/nca53618.2021.9685239","relation":{},"subject":[],"published":{"date-parts":[[2021,11,23]]}}}