{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:17:47Z","timestamp":1725520667195},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/sbcci.2018.8533238","type":"proceedings-article","created":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T21:32:18Z","timestamp":1542317538000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Secure Environment Architecture for MPSoCs"],"prefix":"10.1109","author":[{"given":"Bruno Scherer","family":"Oliveira","sequence":"first","affiliation":[]},{"given":"Henrique","family":"Medina","sequence":"additional","affiliation":[]},{"given":"Anderson","family":"Sant'Ana","sequence":"additional","affiliation":[]},{"given":"Fernando Gehm","family":"Moraes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TR.2016.2606883"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICECS.2015.7440312"},{"year":"2004","journal-title":"aes_crypto_core","key":"ref12"},{"key":"ref13","first-page":"1345","article-title":"HeMPS - a framework for NoC-based MPSoC generation","author":"carara","year":"2009","journal-title":"ISCAS"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.vlsi.2004.03.003"},{"key":"ref15","article-title":"Evaluating the Cost to Cipher the NoC Communication","author":"oliveira","year":"2018","journal-title":"LASCAS"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/NOCS.2012.23"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ISVLSI.2003.1183361"},{"year":"2016","journal-title":"Internet Security Threat Report","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/3109984.3109996"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/INA-OCMC.2015.9"},{"key":"ref8","first-page":"1","article-title":"Fort-NoCs: Mitigating the threat of a compromised NoC","author":"ancajas","year":"2014","journal-title":"DAC"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/HPCC.2014.173"},{"year":"2017","journal-title":"Protecting Data","key":"ref2"},{"year":"2015","journal-title":"International Technology Roadmap for Semiconductors","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/SBCCI.2016.7724054"}],"event":{"name":"2018 31st Symposium on Integrated Circuits and Systems Design (SBCCI)","start":{"date-parts":[[2018,8,27]]},"location":"Bento Goncalves","end":{"date-parts":[[2018,8,31]]}},"container-title":["2018 31st Symposium on Integrated Circuits and Systems Design (SBCCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8513831\/8533220\/08533238.pdf?arnumber=8533238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T14:03:27Z","timestamp":1643205807000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8533238\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/sbcci.2018.8533238","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}