{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T05:13:54Z","timestamp":1751951634697,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/nocs.2018.8512168","type":"proceedings-article","created":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T10:00:44Z","timestamp":1540893644000},"page":"1-8","source":"Crossref","is-referenced-by-count":21,"title":["Architecting a Secure Wireless Network-on-Chip"],"prefix":"10.1109","author":[{"given":"Brian","family":"Lebiednik","sequence":"first","affiliation":[]},{"given":"Sergi","family":"Abadal","sequence":"additional","affiliation":[]},{"given":"Hyoukjun","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Tushar","family":"Krishna","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2015.2496220"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2717764.2717783"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258477"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1007\/11502760_23","article-title":"Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers","volume":"3557","author":"maximov","year":"2005","journal-title":"Fast Software Encryption"},{"key":"ref31","article-title":"Improved cryptanalysis of Py","author":"crowley","year":"2006","journal-title":"Proceedings of SASC 2006 - Stream Ciphers Revisited"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2006.870913"},{"key":"ref37","article-title":"Wave propagation mechanisms for intra-chip communications","volume":"57","author":"yan","year":"2009","journal-title":"IEEE Trans Antennas Propag"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2017.2764901"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2010.5457114"},{"key":"ref34","article-title":"Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays","author":"biham","year":"2005","journal-title":"The ENCRYPT eSTREAM project"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/3186608.3186610","article-title":"Spoofing prevention via rf power profiling in wireless network-on-chip","author":"lebiednik","year":"2018","journal-title":"ACM AISTECS"},{"key":"ref40","article-title":"SVM-based real-time hardware Trojan detection for many-core platform","author":"kulkarni","year":"2016","journal-title":"IEEE ISQED"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2206781.2206844"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3073763.3073768"},{"key":"ref13","article-title":"Architecture and Design of Multi-Channel Millimeter-Wave Wireless Network-on-Chip","volume":"31","author":"yu","year":"2014","journal-title":"IEEE Design & Test"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2379640"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2383384"},{"key":"ref16","article-title":"Reconfigurable Wireless Network-on-Chip with a Dynamic Medium Access Mechanism","author":"mansoor","year":"2015","journal-title":"NOCS &#x2018;12"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2994133.2994137"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/190809.190334"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2016.59"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6525613"},{"key":"ref4","first-page":"1136","article-title":"Packet Security with Path Sensitization for NoCs","author":"travis boraten","year":"2016","journal-title":"Design Automation Test in Europe Conference Exhibition (DATE)"},{"key":"ref27","article-title":"Intel Advanced Encryption Standard (AES-NI)","author":"rott","year":"2012","journal-title":"Intel Developer Zone"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872396"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.19"},{"key":"ref29","article-title":"Introduction to modern cryptography","volume":"207","author":"bellare","year":"2005","journal-title":"U S Department of Commerce"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.69"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2002.1030000"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2003.1183361"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6339473"},{"key":"ref9","article-title":"Leds: Providing location-aware end-to-end data security in wireless sensor networks","volume":"7","author":"ren","year":"2008","journal-title":"IEEE Trans Mobile Comput"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2012.2193835"},{"key":"ref20","article-title":"Bond wire antenna\/feed for operation near 60 GHz","volume":"57","author":"wu","year":"2009","journal-title":"IEEE Trans Microw Theory Tech"},{"key":"ref22","article-title":"Game Theory Models for IEEE 802.11 DCF in Wireless Ad Hoc Networks","volume":"43","author":"xiao","year":"2005","journal-title":"IEEE Commun Mag"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LED.2004.841461"},{"key":"ref24","article-title":"Virtualizing network-on-chip resources in chip-multiprocessors","volume":"35","author":"trivifio","year":"2011","journal-title":"Microprocessors and Microsystems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2537332"},{"key":"ref26","article-title":"A Comparative Survey on Symmetric Key Encryption Techniques","volume":"4","author":"agrawal","year":"2012","journal-title":"IJCSE"},{"key":"ref25","article-title":"Fairness in wireless networks: Issues, measures and challenges","volume":"16","author":"shi","year":"2014","journal-title":"IEEE Commun Surveys Tuts"}],"event":{"name":"2018 Twelfth IEEE\/ACM International Symposium on Networks-on-Chip (NOCS)","start":{"date-parts":[[2018,10,4]]},"location":"Turin","end":{"date-parts":[[2018,10,5]]}},"container-title":["2018 Twelfth IEEE\/ACM International Symposium on Networks-on-Chip (NOCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8501313\/8512146\/08512168.pdf?arnumber=8512168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T17:13:16Z","timestamp":1643217196000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8512168\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/nocs.2018.8512168","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}