{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:54Z","timestamp":1750306074502,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,28]],"date-time":"2017-08-28T00:00:00Z","timestamp":1503878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["302531\/2016-5"],"award-info":[{"award-number":["302531\/2016-5"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,28]]},"DOI":"10.1145\/3109984.3110015","type":"proceedings-article","created":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T13:30:29Z","timestamp":1509975029000},"page":"65-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Secure admission and execution of applications in many-core systems"],"prefix":"10.1145","author":[{"given":"Luciano L.","family":"Caimi","sequence":"first","affiliation":[{"name":"UFFS - Chapeco, Brazil and PUCRS - Porto Alegre, Brazil"}]},{"given":"Vinicius","family":"Fochi","sequence":"additional","affiliation":[{"name":"PUCRS - Porto Alegre, Brazil"}]},{"given":"Eduardo","family":"Wachter","sequence":"additional","affiliation":[{"name":"PUCRS - Porto Alegre, Brazil"}]},{"given":"Daniel","family":"Munhoz","sequence":"additional","affiliation":[{"name":"PUCRS - Porto Alegre, Brazil"}]},{"given":"Fernando G.","family":"Moraes","sequence":"additional","affiliation":[{"name":"PUCRS - Porto Alegre, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2017,8,28]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"516","article-title":"Efficient zero-knowledge identification scheme with secret key exchange","volume":"1","author":"Allam A. M.","year":"2003","unstructured":"A. M. Allam , I. I. Ibrahim , I. A. Ali , and A. E. H. Elsawy . 2003 . Efficient zero-knowledge identification scheme with secret key exchange . In MWSCAS , Vol. 1. 516 -- 519 . A. M. Allam, I. I. Ibrahim, I. A. Ali, and A. E. H. Elsawy. 2003. Efficient zero-knowledge identification scheme with secret key exchange. In MWSCAS, Vol. 1. 516--519.","journal-title":"MWSCAS"},{"volume-title":"ARM","author":"ARM.","key":"e_1_3_2_1_2_1","unstructured":"ARM. 2008. ARM Security Technology Building a Secure System using TrustZone Technology . In ARM . http:\/\/infocenter.arm.com ARM. 2008. ARM Security Technology Building a Secure System using TrustZone Technology. In ARM. http:\/\/infocenter.arm.com"},{"key":"e_1_3_2_1_3_1","volume-title":"Bernstein","author":"Aumasson Jean-Philippe","year":"2012","unstructured":"Jean-Philippe Aumasson and Daniel J . Bernstein . 2012 . SipHash: A Fast Short-Input PRF. Springer Berlin Heidelberg , Berlin, Heidelberg, 489--508. Jean-Philippe Aumasson and Daniel J. Bernstein. 2012. SipHash: A Fast Short-Input PRF. Springer Berlin Heidelberg, Berlin, Heidelberg, 489--508."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"R. Fernandes et al. 2016. A security aware routing approach for NoC-based MPSoCs. In SBCCI. 1--6.   R. Fernandes et al. 2016. A security aware routing approach for NoC-based MPSoCs. In SBCCI. 1--6.","DOI":"10.1109\/SBCCI.2016.7724054"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570691"},{"volume-title":"International Conference on the Network of the Future. 10--14","author":"Hanka O.","key":"e_1_3_2_1_7_1","unstructured":"O. Hanka and H. Wippel . 2011. Secure deployment of application-tailored protocols in future networks . In International Conference on the Network of the Future. 10--14 . O. Hanka and H. Wippel. 2011. Secure deployment of application-tailored protocols in future networks. In International Conference on the Network of the Future. 10--14."},{"volume-title":"Guide to Elliptic Curve Cryptography","author":"Hankerson Darrel","key":"e_1_3_2_1_8_1","unstructured":"Darrel Hankerson , Alfred J. Menezes , and Scott Vanstone . 2003. Guide to Elliptic Curve Cryptography . Springer-Verlag New York ,, Secaucus, NJ, USA. Darrel Hankerson, Alfred J. Menezes, and Scott Vanstone. 2003. Guide to Elliptic Curve Cryptography. Springer-Verlag New York,, Secaucus, NJ, USA."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INA-OCMC.2015.9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"H. Isakovic and A. Wasicek. 2013. Secure channels in an integrated MPSoC architecture. In IECON. 4488--4493.  H. Isakovic and A. Wasicek. 2013. Secure channels in an integrated MPSoC architecture. In IECON. 4488--4493.","DOI":"10.1109\/IECON.2013.6699858"},{"key":"e_1_3_2_1_11_1","volume-title":"BANZKP: a Secure Authentication Scheme Using Zero Knowledge Proof for WBANs. CoRR abs\/1602.00895","author":"Khernane Chaudet C.","year":"2016","unstructured":"M.; Chaudet C. Khernane , N.; Potop-Butucaru. 2016. BANZKP: a Secure Authentication Scheme Using Zero Knowledge Proof for WBANs. CoRR abs\/1602.00895 ( 2016 ). M.; Chaudet C. Khernane, N.; Potop-Butucaru. 2016. BANZKP: a Secure Authentication Scheme Using Zero Knowledge Proof for WBANs. CoRR abs\/1602.00895 (2016)."},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE Power Energy Society General Meeting. 1--5.","author":"Rudolph C. Kuntze","year":"2013","unstructured":"C. Kuntze N.; Rudolph . 2013 . Secure deployment of SmartGrid equipment . In IEEE Power Energy Society General Meeting. 1--5. C. Kuntze N.; Rudolph. 2013. Secure deployment of SmartGrid equipment. In IEEE Power Energy Society General Meeting. 1--5."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"M. M. Real etal 2016. Dynamic spatially isolated secure zones for NoC-based many-core accelerators. In ReCoSoC. 1--6.  M. M. Real et al. 2016. Dynamic spatially isolated secure zones for NoC-based many-core accelerators. In ReCoSoC. 1--6.","DOI":"10.1109\/ReCoSoC.2016.7533900"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"J. Sep\u00falveda et al. 2015. Reconfigurable security architecture for disrupted protection zones in NoC-based MPSoCs. In ReCoSoC. 1--8.  J. Sep\u00falveda et al. 2015. Reconfigurable security architecture for disrupted protection zones in NoC-based MPSoCs. In ReCoSoC. 1--8.","DOI":"10.1109\/ReCoSoC.2015.7238098"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"E. Wachter et al. 2013. Topology-Agnostic fault-tolerant NoC routing method. In DATE. 1595--1600.   E. Wachter et al. 2013. Topology-Agnostic fault-tolerant NoC routing method. In DATE. 1595--1600.","DOI":"10.7873\/DATE.2013.324"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"L. Zhimeng and Z. Yanli. 2016. Provable Secure Node Authentication Protocol for Wireless Sensor Networks. In WISA. 221--224.  L. Zhimeng and Z. Yanli. 2016. Provable Secure Node Authentication Protocol for Wireless Sensor Networks. In WISA. 221--224.","DOI":"10.1109\/WISA.2016.51"}],"event":{"name":"SBCCI '17: 30th Symposium on Integrated Circuits and Systems Design","sponsor":["SBMicro","SBC Brazilian Computer Society","SIGDA ACM Special Interest Group on Design Automation","IEEE Circuits & Systems Society"],"location":"Fortaleza Cear\u00e1 Brazil","acronym":"SBCCI '17"},"container-title":["Proceedings of the 30th Symposium on Integrated Circuits and Systems Design: Chip on the Sands"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3109984.3110015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3109984.3110015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:02Z","timestamp":1750217402000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3109984.3110015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,28]]},"references-count":16,"alternative-id":["10.1145\/3109984.3110015","10.1145\/3109984"],"URL":"https:\/\/doi.org\/10.1145\/3109984.3110015","relation":{},"subject":[],"published":{"date-parts":[[2017,8,28]]},"assertion":[{"value":"2017-08-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}