{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:59:06Z","timestamp":1761580746327},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2010,7,1]],"date-time":"2010-07-01T00:00:00Z","timestamp":1277942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. I"],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/tcsi.2009.2035415","type":"journal-article","created":{"date-parts":[[2010,1,12]],"date-time":"2010-01-12T20:32:56Z","timestamp":1263328376000},"page":"1618-1630","source":"Crossref","is-referenced-by-count":31,"title":["Synthesis-for-Testability Watermarking for Field Authentication of VLSI Intellectual Property"],"prefix":"10.1109","volume":"57","author":[{"family":"Chip-Hong Chang","sequence":"first","affiliation":[]},{"family":"Aijiao Cui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"47","article-title":"identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc CRYPTO'84"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/82.618036"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.1994.528048"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCS.1979.1084687"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2007.892393"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/43.720319"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/VTEST.1996.510840"},{"key":"ref35","first-page":"454","article-title":"functional scan chain design at rtl for skewed-load delay fault testing","author":"ko","year":"2004","journal-title":"IEEE Asian Test Symp"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"728","DOI":"10.1109\/TEST.2001.966694","article-title":"on rtl scan design","author":"huang","year":"2001","journal-title":"Proc IEEE Int Test Conf"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/43.952740"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/74850.74852"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1080334.1080338"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2006.882490"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2008.927732"},{"key":"ref14","first-page":"4611","article-title":"stego-signature at logic synthesis level for digital design ip protection","author":"cui","year":"2006","journal-title":"Proc IEEE Int Symp Circuits Syst"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/4.826826"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/43.945306"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.32"},{"key":"ref18","first-page":"2645","article-title":"intellectual property authentication by watermarking scan chain in design-for-testability flow","author":"cui","year":"2008","journal-title":"Proc IEEE Int Symp Circuits Syst"},{"key":"ref19","article-title":"Intellectual property protection using watermarking partial scan chains for sequential logic test generation","author":"kirovski","year":"1998","journal-title":"Proc IEEE High Level Design Verification and Test"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/35.900647"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2005.851709"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2008.918996"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2008.2002550"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/AHS.2006.77"},{"key":"ref29","author":"abramovici","year":"1990","journal-title":"Digital Systems Testing and Testable Design"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/82.799684"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.1998.694986"},{"key":"ref7","year":"1997","journal-title":"Fall Worldwide Member Meeting A Year of Achievement"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2005.848972"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1998.678190"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2008.921573"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2008.4542133"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2006.870213"},{"key":"ref45","author":"qu","year":"2003","journal-title":"Intellectual Property Protection in VLSI Design Theory and Practice"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-005-1395-x"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.1992.276282"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/el:20030874"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/VTEST.1995.512648"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2005.853340"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"ref23","first-page":"462","volume":"2147","author":"macbeth","year":"2001","journal-title":"Dynamically Reconfigurable Cores"},{"key":"ref44","author":"dossey","year":"2002","journal-title":"Discrete Mathematics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2005.858767"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.1998.743173"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2006.885978"}],"container-title":["IEEE Transactions on Circuits and Systems I: Regular Papers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8919\/5512812\/05373850.pdf?arnumber=5373850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T01:00:35Z","timestamp":1633914035000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5373850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":47,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tcsi.2009.2035415","relation":{},"ISSN":["1549-8328","1558-0806"],"issn-type":[{"value":"1549-8328","type":"print"},{"value":"1558-0806","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,7]]}}}