{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:24:16Z","timestamp":1773771856373,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,7]],"date-time":"2012-10-07T00:00:00Z","timestamp":1349568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,7]]},"DOI":"10.1145\/2380403.2380414","type":"proceedings-article","created":{"date-parts":[[2012,10,9]],"date-time":"2012-10-09T12:20:46Z","timestamp":1349785246000},"page":"17-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["A cost-effective tag design for memory data authentication in embedded systems"],"prefix":"10.1145","author":[{"given":"Mei","family":"Hong","sequence":"first","affiliation":[{"name":"The University of New South Wales, Sydney, Australia"}]},{"given":"Hui","family":"Guo","sequence":"additional","affiliation":[{"name":"The University of New South Wales, Sydney, Australia"}]},{"given":"Sharon X.","family":"Hu","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1991.185352"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/956417.956575"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_1_6_1","first-page":"295","volume-title":"Caches and hash trees for efficient memory integrity verification","author":"Gassend B.","year":"2003","unstructured":"B. Gassend , G.E. Suh , D. Clarke , M. van Dijk , and S. Devadas . Caches and hash trees for efficient memory integrity verification . pages 295 -- 306 , 2003 . B. Gassend, G.E. Suh, D. Clarke, M. van Dijk, and S. Devadas. Caches and hash trees for efficient memory integrity verification. pages 295 -- 306, 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_20"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502011"},{"key":"e_1_3_2_1_9_1","volume-title":"Submission to National Institute of Standards and Technology","author":"McGrew D.A.","year":"2004","unstructured":"D.A. McGrew and J. Viega . The galois counter mode of operation (GCM). Technical report , Submission to National Institute of Standards and Technology , Federal Information Processing Standards , 2004 . D.A. McGrew and J. Viega. The galois counter mode of operation (GCM). Technical report, Submission to National Institute of Standards and Technology, Federal Information Processing Standards, 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2009.06.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.22"},{"key":"e_1_3_2_1_12_1","volume-title":"New methods in hard disk encryption. Technical report","author":"Fruhwirth C","year":"2005","unstructured":"C Fruhwirth . New methods in hard disk encryption. Technical report , Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology , 2005 . C Fruhwirth. New methods in hard disk encryption. Technical report, Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology, 2005."},{"key":"e_1_3_2_1_13_1","volume-title":"Cryptography: A New Dimension in Computer Data Security","author":"Meyer C.","year":"1982","unstructured":"C. Meyer and S. Matyas . Cryptography: A New Dimension in Computer Data Security . John Wiley & Sons , 1982 . C. Meyer and S. Matyas. Cryptography: A New Dimension in Computer Data Security. John Wiley & Sons, 1982."},{"key":"e_1_3_2_1_14_1","volume-title":"Discrete-event system simulation","author":"Banks J.","year":"2010","unstructured":"J. Banks and B. L. Nelson . Discrete-event system simulation . Prentice Hall , 2010 . J. Banks and B. L. Nelson. Discrete-event system simulation. Prentice Hall, 2010."},{"key":"e_1_3_2_1_15_1","unstructured":"Tensilica. Xtensa customizable processor. http:\/\/www.tensilica.com.  Tensilica. Xtensa customizable processor. http:\/\/www.tensilica.com."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1128020.1128563"},{"key":"e_1_3_2_1_17_1","unstructured":"Mentor Graphics Corp. http:\/\/www.mentor.com.  Mentor Graphics Corp. http:\/\/www.mentor.com."},{"key":"e_1_3_2_1_18_1","unstructured":"Design compiler. Synopsys Inc. (http:\/\/www.synopsys.com).  Design compiler. Synopsys Inc. (http:\/\/www.synopsys.com)."},{"key":"e_1_3_2_1_19_1","volume-title":"Specification for the advanced encryption standard (AES). Technical report","author":"Pub FIPS","year":"2001","unstructured":"FIPS Pub . 197. Specification for the advanced encryption standard (AES). Technical report , National Institute of Standards and Technology , Federal Information Processing Standards, 2001 . FIPS Pub. 197. Specification for the advanced encryption standard (AES). Technical report, National Institute of Standards and Technology, Federal Information Processing Standards, 2001."},{"key":"e_1_3_2_1_20_1","unstructured":"EasyFitXL. Easyfitxl. http:\/\/www.mathwave.com\/articles\/fit-distributions-excel.html.  EasyFitXL. Easyfitxl. http:\/\/www.mathwave.com\/articles\/fit-distributions-excel.html."}],"event":{"name":"ESWEEK'12: Eighth Embedded System Week","location":"Tampere Finland","acronym":"ESWEEK'12","sponsor":["CEDA","SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE CS"]},"container-title":["Proceedings of the 2012 international conference on Compilers, architectures and synthesis for embedded systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2380403.2380414","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2380403.2380414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:21Z","timestamp":1750238481000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2380403.2380414"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,7]]},"references-count":20,"alternative-id":["10.1145\/2380403.2380414","10.1145\/2380403"],"URL":"https:\/\/doi.org\/10.1145\/2380403.2380414","relation":{},"subject":[],"published":{"date-parts":[[2012,10,7]]},"assertion":[{"value":"2012-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}