{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:54:33Z","timestamp":1760597673988},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/test.2015.7342386","type":"proceedings-article","created":{"date-parts":[[2015,12,3]],"date-time":"2015-12-03T21:11:39Z","timestamp":1449177099000},"page":"1-8","source":"Crossref","is-referenced-by-count":26,"title":["Concurrent hardware Trojan detection in wireless cryptographic ICs"],"prefix":"10.1109","author":[{"given":"Yu","family":"Liu","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Volanis","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yiorgos","family":"Makris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"173","article-title":"Self-referencing: A scalable side-channel approach for hardware Trojan detection","author":"du","year":"2010","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref11","article-title":"High-sensitivity hardware Trojan detection using multimodal characterization power mapping of integrated circuits using AC-based thermography","author":"hu","year":"0","journal-title":"IEEE\/ACM Design Automation and Test in Europe 2013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.21"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2096811"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513122"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2013.6691149"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2006.6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2014.2354406"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224990"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2013.6691167"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.855962"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1984.1659219"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2000.894311"},{"key":"ref8","first-page":"296","article-title":"Trojan detection using IC fingerprinting","author":"agrawal","year":"0","journal-title":"IEEE Symposium on Security and Privacy"},{"journal-title":"Error Detection Circuits","year":"1993","author":"gossel","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4505310"},{"key":"ref9","first-page":"51","article-title":"Hardware Trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"IEEE International Workshop on Hardware-Oriented Security and Trust"},{"key":"ref20","first-page":"1010","article-title":"Cluster-based distributed active current timer for hardware Trojan detection","author":"cao","year":"0","journal-title":"IEEE International Symposium on Circuits and Systems"},{"key":"ref22","first-page":"965","article-title":"Post-deployment trust evaluation in wireless cryptographic ICs","author":"jin","year":"2012","journal-title":"Design Automation and Test in Europe Conference"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.260"}],"event":{"name":"2015 IEEE International Test Conference (ITC)","start":{"date-parts":[[2015,10,6]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2015,10,8]]}},"container-title":["2015 IEEE International Test Conference (ITC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7331771\/7342364\/07342386.pdf?arnumber=7342386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:59:47Z","timestamp":1490392787000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7342386\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/test.2015.7342386","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}