{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T08:41:20Z","timestamp":1774428080137,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["107-2218-E-006-025"],"award-info":[{"award-number":["107-2218-E-006-025"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Qualcomm Inc."}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2022,1,1]]},"DOI":"10.1109\/tetc.2020.3021820","type":"journal-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T20:48:44Z","timestamp":1599770924000},"page":"373-385","source":"Crossref","is-referenced-by-count":23,"title":["A Dynamic-Key Based Secure Scan Architecture for Manufacturing and In-Field IC Testing"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6690-0074","authenticated-orcid":false,"given":"Kuen-Jong","family":"Lee","sequence":"first","affiliation":[{"name":"Department Electrical Engineering, National Cheng Kung University, Tainan, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9416-1010","authenticated-orcid":false,"given":"Ching-An","family":"Liu","sequence":"additional","affiliation":[{"name":"Department Electrical Engineering, National Cheng Kung University, Tainan, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7059-333X","authenticated-orcid":false,"given":"Chia-Chi","family":"Wu","sequence":"additional","affiliation":[{"name":"Department Electrical Engineering, National Cheng Kung University, Tainan, Taiwan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2304492"},{"key":"ref2","volume-title":"Introduction to Hardware Security and Trust","author":"Tehranipoor","year":"2011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2004.1386969"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ASQED.2009.5206245"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.01.009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.10"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.52"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2016.7477293"},{"key":"ref10","first-page":"1","article-title":"Fault attacks on secure chips: From glitch to flash","volume-title":"Proc. Des. Secur. Cryptogr. Algorithms Devices","author":"Skorobogatov"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593204"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2018.00020"},{"key":"ref14","article-title":"Security locks for integrated circuits","year":"1993"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70215"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2089071"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2007.89"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2903387"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/OLT.2004.1319691"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2013.47"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2006.7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2613847"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2772817"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2818722"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2018.8494852"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.8"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1201\/b10805"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2024723.2000086"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CASES.2013.6662530"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ESSCIRC.2012.6341361"},{"key":"ref33","article-title":"Antifuse-based split-channel 1T-fuse bit cell for OTP NVM IP"},{"key":"ref34","volume-title":"VLSI Test Principles And Architectures: Design for Testability","author":"Wang","year":"2006"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2005.36"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-SoC.2013.6673281"},{"key":"ref37","article-title":"Exploiting the scan side channel for reverse engineering of a VLSI device","author":"Azriel","year":"2016"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2016.10.011"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSSC.2019.2923503"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41395-7"},{"key":"ref42","article-title":"Physically unclonable function database"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2018.8310218"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2017.8353988"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2009.20"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2018.8607168"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176618"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/9726526\/09194339.pdf?arnumber=9194339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:18:36Z","timestamp":1704845916000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9194339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":46,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2020.3021820","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}