{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:07:15Z","timestamp":1758892035774,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T00:00:00Z","timestamp":1633651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,14]]},"DOI":"10.1145\/3479876.3481592","type":"proceedings-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T19:14:45Z","timestamp":1633461285000},"page":"29-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Securing network-on-chips via novel anonymous routing"],"prefix":"10.1145","author":[{"given":"Amin","family":"Sarihi","sequence":"first","affiliation":[{"name":"New Mexico State University"}]},{"given":"Ahmad","family":"Patooghy","sequence":"additional","affiliation":[{"name":"North Carolina A&amp;T State University"}]},{"given":"Mahdi","family":"Hasanzadeh","sequence":"additional","affiliation":[{"name":"Tehran, Iran"}]},{"given":"Mostafa","family":"Abdelrehim","sequence":"additional","affiliation":[{"name":"California State University"}]},{"given":"Abdel-Hameed A.","family":"Badawy","sequence":"additional","affiliation":[{"name":"New Mexico State University"}]}],"member":"320","published-online":{"date-parts":[[2021,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593144"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"e_1_3_2_1_3_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1136--1139","author":"Boraten Travis","year":"2016","unstructured":"Travis Boraten and Avinash Karanth Kodi . 2016 . Packet security with path sensitization for NoCs. In 2016 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1136--1139 . Travis Boraten and Avinash Karanth Kodi. 2016. Packet security with path sensitization for NoCs. In 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1136--1139."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444860"},{"key":"e_1_3_2_1_5_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 334--337","author":"Charles Subodha","year":"2020","unstructured":"Subodha Charles , Megan Logan , and Prabhat Mishra . 2020 . Lightweight anonymous routing in noc based socs. In 2020 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 334--337 . Subodha Charles, Megan Logan, and Prabhat Mishra. 2020. Lightweight anonymous routing in noc based socs. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 334--337."},{"key":"e_1_3_2_1_6_1","volume-title":"Lightweight and Trust-Aware Routing in NoC-Based SoCs. In 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 160--167","author":"Charles Subodha","year":"2020","unstructured":"Subodha Charles and Prabhat Mishra . 2020 . Lightweight and Trust-Aware Routing in NoC-Based SoCs. In 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 160--167 . Subodha Charles and Prabhat Mishra. 2020. Lightweight and Trust-Aware Routing in NoC-Based SoCs. In 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 160--167."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI49217.2020.00039"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.291"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2019.8884979"},{"key":"e_1_3_2_1_10_1","volume-title":"International Workshop on Radio Frequency Identification: Security and Privacy Issues. Springer, 19--31","author":"Engels Daniel","year":"2011","unstructured":"Daniel Engels , Markku-Juhani O Saarinen , Peter Schweitzer , and Eric M Smith . 2011 . The Hummingbird-2 lightweight authenticated encryption algorithm . In International Workshop on Radio Frequency Identification: Security and Privacy Issues. Springer, 19--31 . Daniel Engels, Markku-Juhani O Saarinen, Peter Schweitzer, and Eric M Smith. 2011. The Hummingbird-2 lightweight authenticated encryption algorithm. In International Workshop on Radio Frequency Identification: Security and Privacy Issues. Springer, 19--31."},{"key":"e_1_3_2_1_11_1","volume-title":"Heracles: Fully Synthesizable Parameterized MIPS-Based Multicore System. In 2011 21st International Conference on Field Programmable Logic and Applications. 356--362","author":"Kinsy Michel A.","year":"2011","unstructured":"Michel A. Kinsy , Michael Pellauer , and Srinivas Devadas . 2011 . Heracles: Fully Synthesizable Parameterized MIPS-Based Multicore System. In 2011 21st International Conference on Field Programmable Logic and Applications. 356--362 . Michel A. Kinsy, Michael Pellauer, and Srinivas Devadas. 2011. Heracles: Fully Synthesizable Parameterized MIPS-Based Multicore System. In 2011 21st International Conference on Field Programmable Logic and Applications. 356--362."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-011-9075-5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2018.8628832"},{"volume-title":"Hardware security: design, threats, and safeguards","author":"Mukhopadhyay Debdeep","key":"e_1_3_2_1_14_1","unstructured":"Debdeep Mukhopadhyay and Rajat Subhra Chakraborty . 2014. Hardware security: design, threats, and safeguards . CRC Press . Debdeep Mukhopadhyay and Rajat Subhra Chakraborty. 2014. Hardware security: design, threats, and safeguards. CRC Press."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2016.25"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2016.12.010"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla et al. 1999. Diffie-hellman key agreement method. Technical Report. RFC 2631 June.  Eric Rescorla et al. 1999. Diffie-hellman key agreement method. Technical Report. RFC 2631 June.","DOI":"10.17487\/rfc2631"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3100540"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660289"}],"event":{"name":"NOCS '21: International Symposium on Networks-on-Chip","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CAS","IEEE Council on Electronic Design Automation (CEDA)"],"location":"Virtual Event","acronym":"NOCS '21"},"container-title":["Proceedings of the 15th IEEE\/ACM International Symposium on Networks-on-Chip"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479876.3481592","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479876.3481592","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:19:01Z","timestamp":1750191541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479876.3481592"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,8]]},"references-count":19,"alternative-id":["10.1145\/3479876.3481592","10.1145\/3479876"],"URL":"https:\/\/doi.org\/10.1145\/3479876.3481592","relation":{},"subject":[],"published":{"date-parts":[[2021,10,8]]},"assertion":[{"value":"2021-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}