{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:31:57Z","timestamp":1766136717632},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2017,1,1]]},"DOI":"10.1109\/tc.2016.2576444","type":"journal-article","created":{"date-parts":[[2016,6,7]],"date-time":"2016-06-07T18:09:23Z","timestamp":1465322963000},"page":"100-113","source":"Crossref","is-referenced-by-count":32,"title":["Latch-Based Structure: A High Resolution and Self-Reference Technique for Hardware Trojan Detection"],"prefix":"10.1109","volume":"66","author":[{"given":"Ghobad","family":"Zarrinchian","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Morteza Saheb","family":"Zamani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2011.6081416"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSM.2007.913186"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2010.2089568"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.910961"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2014.6881482"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224319"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2013.2237695"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2009.2039270"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2011.5770807"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2009.2022217"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2008.37"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403703"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559048"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224960"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"ref15","first-page":"8","article-title":"At-speed delay characterization for IC authentication and trojan horse detection","author":"li","year":"0","journal-title":"Proc Workshop on Hardware-Oriented Security and Trust"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681644"},{"key":"ref17","first-page":"1","article-title":"RON: An on-chip ring oscillator network for hardware trojan detection","author":"zhang","year":"0","journal-title":"Proc Des Autom Test Eur"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2011.5783766"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2429384.2429392"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954999"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2009.2029117"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.284"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2013.2255913"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-00816-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2012.2196252"},{"key":"ref2","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_29"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2163307"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2013.2249555"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2015.02.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2014.01.003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2061228"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630091"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2164908"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559047"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/7779217\/07486022.pdf?arnumber=7486022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:12:26Z","timestamp":1642003946000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7486022\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,1]]},"references-count":39,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tc.2016.2576444","relation":{},"ISSN":["0018-9340"],"issn-type":[{"value":"0018-9340","type":"print"}],"subject":[],"published":{"date-parts":[[2017,1,1]]}}}