{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:38Z","timestamp":1750306658415,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,5]],"date-time":"2014-10-05T00:00:00Z","timestamp":1412467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,5]]},"DOI":"10.1145\/2663761.2664206","type":"proceedings-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T12:29:24Z","timestamp":1413289764000},"page":"258-262","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["FSM watermarks based on ordering of flip flops"],"prefix":"10.1145","author":[{"given":"Edward","family":"Jung","sequence":"first","affiliation":[{"name":"Southern Polytechnic State Univ., Marietta, GA"}]},{"given":"Chie-Cheng","family":"Hung","sequence":"additional","affiliation":[{"name":"Southern Polytechnic State Univ., Marietta, GA"}]},{"given":"Seonho","family":"Choi","sequence":"additional","affiliation":[{"name":"Bowie State University, Bowie, MD"}]}],"member":"320","published-online":{"date-parts":[[2014,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-005-1395-x"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.1989.100747"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2010.2098131"},{"key":"e_1_3_2_1_4_1","unstructured":"Juris Hartmanis and R. E Stearns. 1966. Algebraic Structure Theory of Sequential Machines (Prentice-Hall International Series in Applied Mathematics). Prentice-Hall Inc. Upper Saddle River NJ USA.   Juris Hartmanis and R. E Stearns. 1966. Algebraic Structure Theory of Sequential Machines (Prentice-Hall International Series in Applied Mathematics). Prentice-Hall Inc. Upper Saddle River NJ USA."},{"key":"e_1_3_2_1_5_1","unstructured":"Zvi Kohavi. 1978. Switching and Finite Automata Theory (2nd ed.). McGraw-Hill.   Zvi Kohavi. 1978. Switching and Finite Automata Theory (2nd ed.). McGraw-Hill."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513115"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080334.1080338"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/378239.378568"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2163307"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/309847.310080"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224313"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/309847.310082"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/43.945306"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the IEEE","volume":"87","author":"Petitcolas Fabien AP","year":"1999"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/288548.288607"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Pramod Subramanyan Nestan Tsiskaridze Wenchao Li Adri\u00e0 Gasc\u00f3n Wei Yang Tan Ashish Tiwari Natarajan Shankar Sanjit A. Seshia and Sharad Malik. 2014. Reverse Engineering Digital Circuits Using Structural and Functional Analyses. To appear in IEEE Transactions on Emerging Topics in Computing.  Pramod Subramanyan Nestan Tsiskaridze Wenchao Li Adri\u00e0 Gasc\u00f3n Wei Yang Tan Ashish Tiwari Natarajan Shankar Sanjit A. Seshia and Sharad Malik. 2014. Reverse Engineering Digital Circuits Using Structural and Functional Analyses. To appear in IEEE Transactions on Emerging Topics in Computing .","DOI":"10.1109\/TETC.2013.2294918"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Mohammad Tehranipoor and Cliff Wang (Ed.). 2012. Introduction to Hardware Security and Trust. Springer Science+Business Media LLC. Chapter 17.   Mohammad Tehranipoor and Cliff Wang (Ed.). 2012. Introduction to Hardware Security and Trust . Springer Science+Business Media LLC. Chapter 17.","DOI":"10.1007\/978-1-4419-8080-9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/4.826826"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2003.819900"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_24"}],"event":{"name":"RACS '14: International Conference on Research in Adaptive and Convergent Systems","sponsor":["Winway Systems Winway Systems, Inc.","SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology","TU Towson University"],"location":"Towson Maryland","acronym":"RACS '14"},"container-title":["Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663761.2664206","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2663761.2664206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:18Z","timestamp":1750229778000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663761.2664206"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,5]]},"references-count":20,"alternative-id":["10.1145\/2663761.2664206","10.1145\/2663761"],"URL":"https:\/\/doi.org\/10.1145\/2663761.2664206","relation":{},"subject":[],"published":{"date-parts":[[2014,10,5]]},"assertion":[{"value":"2014-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}