{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:13:04Z","timestamp":1755792784211,"version":"3.44.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wf-iot.2016.7845427","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:42:54Z","timestamp":1486658574000},"page":"615-620","source":"Crossref","is-referenced-by-count":4,"title":["Adapting processor architectures for the periphery of the IoT nervous system"],"prefix":"10.1109","author":[{"given":"Paul G.","family":"Flikkema","sequence":"first","affiliation":[{"name":"School of Informatics, Computing and Cyber Systems, Northern Arizona University, Flagstaff, AZ 86001 USA"}]},{"given":"Bertrand","family":"Cambou","sequence":"additional","affiliation":[{"name":"School of Informatics, Computing and Cyber Systems, Northern Arizona University, Flagstaff, AZ 86001 USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440955"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2007.4379672"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477604"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2013.2238645"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2501626.2512465"},{"journal-title":"Real-Time Systems","year":"2000","author":"liu","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/5.476078"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1147\/rd.111.0025"},{"journal-title":"Computer Architecture A Quantitative Approach","year":"2011","author":"hennessy","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISSoC.2013.6675259"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1109\/WCNM.2005.1544200","article-title":"Low power processor design for wireless sensor network applications","volume":"2","author":"xu","year":"2005","journal-title":"Proceedings 2005 International Conference on Wireless Communications Networking and Mobile Computing 2005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/195473.195579"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/232973.232993"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/12.2247"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1086297.1086330"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.12"},{"key":"ref7","volume":"28","author":"faraboschi","year":"2000","journal-title":"Lx a technology platform for customizable VLIW embedded processing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/225830.224449"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440958"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/2.30730"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-642-21599-5_14","article-title":"Extracting device fingerprints from flash memory by exploiting physical variations","author":"prabhu","year":"2011","journal-title":"Trust and Trustworthy Computing"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref21","article-title":"STT-MRAM-based PUF architecture exploiting magnetic tunnel junction fabrication-induced variability","volume":"12","author":"vatajelu","year":"2015","journal-title":"ACM Journal on Emerging Technologies in Computing Systems"},{"key":"ref24","first-page":"350","article-title":"Physical vulnerabilities of physically unclonable functions","author":"helfmeier","year":"0","journal-title":"Proc Conf Design Automation & Test in Europe"},{"journal-title":"FPGA Intrinsic PUFs and Their Use for IP Protection","year":"2007","author":"guajardo","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361070"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2897795.2897808"}],"event":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2016,12,12]]},"location":"Reston, VA, USA","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7831562\/7845389\/07845427.pdf?arnumber=7845427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:43:33Z","timestamp":1755197013000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7845427\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2016.7845427","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}