{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:15Z","timestamp":1750307535933,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,8,31]],"date-time":"2009-08-31T00:00:00Z","timestamp":1251676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,8,31]]},"DOI":"10.1145\/1601896.1601915","type":"proceedings-article","created":{"date-parts":[[2009,9,8]],"date-time":"2009-09-08T12:53:09Z","timestamp":1252414389000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking"],"prefix":"10.1145","author":[{"given":"Raju","family":"Halder","sequence":"first","affiliation":[{"name":"University of Calcutta, Kolkata, India"}]},{"given":"Parthasarathi","family":"Dasgupta","sequence":"additional","affiliation":[{"name":"Indian Institute of Management Calcutta, Kolkata, India"}]},{"given":"Saptarshi","family":"Naskar","sequence":"additional","affiliation":[{"name":"University of Calcutta, Kolkata, India"}]},{"given":"Samar Sen","family":"Sarma","sequence":"additional","affiliation":[{"name":"University of Calcutta, Kolkata, India"}]}],"member":"320","published-online":{"date-parts":[[2009,8,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/43.952740"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2003.822126"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/764808.764847"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/277044.277241"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.1998.694985"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2000.852721"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTA.2007.17"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Proc. of the Field Programmable Logic and Applications","author":"Garcia A.","year":"2006","unstructured":"A. Garcia A. Loris U. Meyer-Baese E. Castillo , L. Parrilla . Ipp watermarking technique for ip core protection on fpl devices . In Proc. of the Field Programmable Logic and Applications , pages 1 -- 6 , August 2006 . A. Garcia A. Loris U. Meyer-Baese E. Castillo, L. Parrilla. Ipp watermarking technique for ip core protection on fpl devices. In Proc. of the Field Programmable Logic and Applications, pages 1--6, August 2006."},{"key":"e_1_3_2_1_9_1","volume-title":"Tata Mc-graw Hill","author":"Hayes","year":"1996","unstructured":"J. P. Hayes . Computer Architecture and Organization . Tata Mc-graw Hill , 1996 . J. P. Hayes. Computer Architecture and Organization. Tata Mc-graw Hill, 1996."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/309847.310080"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/AHS.2006.77"},{"key":"e_1_3_2_1_13_1","volume-title":"Digital System testing and Testable Design","author":"Friedman Miron Abramovici Melvin A.","year":"2001","unstructured":"A. D. Friedman Miron Abramovici Melvin A. Breuer . Digital System testing and Testable Design . Jaico Publishers , 2001 . A. D. Friedman Miron Abramovici Melvin A. Breuer. Digital System testing and Testable Design. Jaico Publishers, 2001."},{"key":"e_1_3_2_1_14_1","first-page":"1348","volume-title":"Proc. of the","author":"Ni Z.","year":"2005","unstructured":"M. Ni and Z. Gao . Detector-based watermarking technique for soft ip core protection in high synthesis design level . In Proc. of the , pages 1348 -- 1352 , 2005 . M. Ni and Z. Gao. Detector-based watermarking technique for soft ip core protection in high synthesis design level. In Proc. of the, pages 1348--1352, 2005."},{"key":"e_1_3_2_1_15_1","volume-title":"Cryptography and network security","author":"Stallings","year":"2005","unstructured":"W. Stallings . Cryptography and network security . Prentice-Hall India , 2005 . W. Stallings. Cryptography and network security. Prentice-Hall India, 2005."},{"key":"e_1_3_2_1_16_1","unstructured":"The ISPD98 Circuit Benchmark Suite. http:\/\/vlsicad.ucsd.edu\/uclaweb\/cheese\/ispd98.html.  The ISPD98 Circuit Benchmark Suite. http:\/\/vlsicad.ucsd.edu\/uclaweb\/cheese\/ispd98.html."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_16"}],"event":{"name":"SBCCI '09: 22nd Symposium on Integrated Circuits and System Design","sponsor":["SBC Brazilian Computer Society","SIGDA ACM Special Interest Group on Design Automation","SBMICRO Brazilian Microelectronics Society","IEEE Circuits & Systems Society"],"location":"Natal Brazil","acronym":"SBCCI '09"},"container-title":["Proceedings of the 22nd Annual Symposium on Integrated Circuits and System Design: Chip on the Dunes"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1601896.1601915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1601896.1601915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:17Z","timestamp":1750249397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1601896.1601915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,31]]},"references-count":16,"alternative-id":["10.1145\/1601896.1601915","10.1145\/1601896"],"URL":"https:\/\/doi.org\/10.1145\/1601896.1601915","relation":{},"subject":[],"published":{"date-parts":[[2009,8,31]]},"assertion":[{"value":"2009-08-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}