{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T04:05:48Z","timestamp":1775275548868,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978295","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"591-602","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["MEMS Gyroscopes as Physical Unclonable Functions"],"prefix":"10.1145","author":[{"given":"Oliver","family":"Willers","sequence":"first","affiliation":[{"name":"Robert Bosch GmbH, Stuttgart, Germany"}]},{"given":"Christopher","family":"Huth","sequence":"additional","affiliation":[{"name":"Robert Bosch GmbH, Stuttgart, Germany"}]},{"given":"Jorge","family":"Guajardo","sequence":"additional","affiliation":[{"name":"Robert Bosch LLC, Pittsburgh, USA"}]},{"given":"Helmut","family":"Seidel","sequence":"additional","affiliation":[{"name":"Saarland University, Saarbr{\u00fc}cken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"M. Weiser \"The computer for the 21st century-scientific american special issue on communications \" Computers and Networks 1991.  M. Weiser \"The computer for the 21st century-scientific american special issue on communications \" Computers and Networks 1991.","DOI":"10.1038\/scientificamerican0991-94"},{"key":"e_1_3_2_1_2_1","first-page":"14","article-title":"The internet of things -- how the next evolution of the internet is changing everything","volume":"1","author":"Evans D.","year":"2011","journal-title":"CISCO white paper"},{"key":"e_1_3_2_1_3_1","volume-title":"NDSS 2012","author":"Eldefrawy K.","year":"2012"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"e_1_3_2_1_7_1","first-page":"176","volume-title":"Digest of Technical Papers. 2004 Symposium on","author":"Lee J.","year":"2004"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284683"},{"key":"e_1_3_2_1_11_1","first-page":"65","volume-title":"SISW 2002","author":"Samyde D.","year":"2002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_25"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2527317.2527319"},{"key":"e_1_3_2_1_15_1","volume-title":"Biometrics-based cryptographic key generation.,\" in IEEE International Conference on Multimedia and Expo (ICME)","author":"Chang Y.-J.","year":"2004"},{"key":"e_1_3_2_1_16_1","series-title":"LNCS","first-page":"393","volume-title":"4th International Conference, AVBPA","author":"Linnartz J. M. G.","year":"2003"},{"key":"e_1_3_2_1_17_1","first-page":"523","volume-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,\" in Advances in cryptology-Eurocrypt","author":"Dodis Y.","year":"2004"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.704269"},{"key":"e_1_3_2_1_19_1","volume-title":"Handbook of Silicon Based MEMS Materials and Technologies","author":"Lindroos V.","year":"2010"},{"key":"e_1_3_2_1_20_1","first-page":"65","volume-title":"Introduction to Hardware Security and Trust, ch. Security Based on Physical Unclonability and Disorder","author":"R\u00fchrmair U.","year":"2012"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31912-9_20"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"T. Morris \"Trusted platform module \" in Encyclopedia of Cryptography and Security pp. 1332--1335 Springer 2011.  T. Morris \"Trusted platform module \" in Encyclopedia of Cryptography and Security pp. 1332--1335 Springer 2011.","DOI":"10.1007\/978-1-4419-5906-5_796"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sna.2006.11.006"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.382012"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.532891"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261765"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/entropy-e10020071"},{"key":"e_1_3_2_1_28_1","volume-title":"DTIC Document","author":"Rukhin A.","year":"2001"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1867635.1867644"},{"key":"e_1_3_2_1_30_1","volume-title":"Nist draft special publication 800--90b recommendation for the entropy sources used for random bit generation","author":"Barker E.","year":"2012"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/148544.148545"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_14"},{"key":"e_1_3_2_1_33_1","first-page":"374","volume-title":"Reverse fuzzy extractors: Enabling lightweight mutual authentication for puf-enabled rfids,\" in Financial Cryptography and Data Security","author":"Van Herrewege A.","year":"2012"},{"key":"e_1_3_2_1_34_1","first-page":"312","volume-title":"Spongent: A lightweight hash function,\" in Cryptographic Hardware and Embedded Systems--CHES","author":"Bogdanov A.","year":"2011"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"e_1_3_2_1_36_1","first-page":"556","volume-title":"End-to-end design of a puf-based privacy preserving authentication protocol,\" in International Workshop on Cryptographic Hardware and Embedded Systems","author":"Aysu A.","year":"2015"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.10"},{"key":"e_1_3_2_1_40_1","first-page":"670","volume-title":"ICCAD 2008. IEEE\/ACM International Conference on","author":"Majzoobi M.","year":"2008"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.19"},{"key":"e_1_3_2_1_44_1","first-page":"1","volume-title":"2013 IEEE International Symposium on","author":"Helfmeier C.","year":"2013"},{"key":"e_1_3_2_1_45_1","volume-title":"DATE","author":"R\u00fchrmair U.","year":"2014"},{"key":"e_1_3_2_1_46_1","first-page":"112","volume-title":"2010 IEEE International Symposium on","author":"Rosenfeld K.","year":"2010"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978295","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:16Z","timestamp":1750222576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":44,"alternative-id":["10.1145\/2976749.2978295","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978295","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}