{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:48:31Z","timestamp":1729619311556,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/anti-cybercrime.2017.7905289","type":"proceedings-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T21:13:00Z","timestamp":1493068380000},"page":"193-198","source":"Crossref","is-referenced-by-count":2,"title":["Secure design of communication networks"],"prefix":"10.1109","author":[{"given":"Valery","family":"Sklyarov","sequence":"first","affiliation":[]},{"given":"Iouliia","family":"Skliarova","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2147340"},{"key":"ref11","article-title":"Secure NAND Flash Memories Resilient to Strong Fault Injection Attacks Using Algebraic Manipulation Detection Codes","author":"luo","year":"0","journal-title":"Proc of the International Conference on Security and Management - SAM'2013"},{"journal-title":"Hardware\/Software Co-design for Programmable Systems-on-Chip","year":"2014","author":"sklyarov","key":"ref12"},{"journal-title":"Xilinx Inc Vivado Design Suite","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04708-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2008.2010176"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14429\/dsj.66.10800"},{"key":"ref17","first-page":"41","volume":"10","author":"falohun","year":"2016","journal-title":"An Access Control System using Bimodal Biometrics &#x201D; International Journal of Applied Information Systems Foundation of Computer Science - FCS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/Anti-Cybercrime.2015.7351934"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"39","DOI":"10.9790\/0661-0333946","article-title":"Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Techniques","volume":"3","author":"ramachandra","year":"2012","journal-title":"IOSR Journal of Computer Engineering (IOSRJCE)"},{"journal-title":"Digilent Inc ZyBo Reference Manual","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2015.2399656"},{"journal-title":"Digilent Inc Nexys-4&#x2122; reference manual","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BEC.2016.7743718"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0092-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/9780470289228"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.146"},{"key":"ref2","first-page":"8","article-title":"Xilinx 16nm UltraScale+ Devices Yield 2-5X Performance\/watt Advantage","volume":"90","author":"santarini","year":"2015","journal-title":"Xcell Journal"},{"key":"ref9","article-title":"Robust Error Detection in Communication and Computation Channels","author":"karpovsky","year":"0","journal-title":"Keynotepaper Int Workshopon Spectral Techniques"},{"journal-title":"Xilinx Inc Zynq-7000 All Programmable SoC Technical Reference Manual","year":"2014","key":"ref1"},{"key":"ref20","first-page":"4825","article-title":"Digital Hamming weight and Distance Analyzers for Binary Vectors and Matrices","volume":"9","author":"sklyarov","year":"2013","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10470-015-0502-6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-013-0360-y"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2015.7313700"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1049\/el:20070141"},{"journal-title":"VC707 Evaluation Board for the Virtex-7 FPGA User Guide UG885 (v1 4)","year":"0","author":"inc","key":"ref26"},{"journal-title":"Avnet Inc","article-title":"ZedBoard (Zynq&#x2122; Evaluation and Development) Hardware User's Guide","year":"0","key":"ref25"}],"event":{"name":"2017 2nd International Conference on Anti-Cyber Crimes (ICACC)","start":{"date-parts":[[2017,3,26]]},"location":"Abha, Saudi Arabia","end":{"date-parts":[[2017,3,27]]}},"container-title":["2017 2nd International Conference on Anti-Cyber Crimes (ICACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7899160\/7905252\/07905289.pdf?arnumber=7905289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T19:54:21Z","timestamp":1569095661000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7905289\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/anti-cybercrime.2017.7905289","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}