{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:39:12Z","timestamp":1725601152369},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.23919\/date.2018.8342056","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T19:20:11Z","timestamp":1524511211000},"page":"479-484","source":"Crossref","is-referenced-by-count":3,"title":["A reconfigurable scan network based IC identification for embedded devices"],"prefix":"10.23919","author":[{"given":"Omid","family":"Aramoon","sequence":"first","affiliation":[]},{"given":"Xi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Qu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.1998.694986"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2003.822126"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/337292.337586"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2015.7059111"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744780"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2017.7918326"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.862745"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2004.1386969"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2007.89"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2304492"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.23"},{"journal-title":"Intellectual Property Protection in VLSI Designs Theory and Practice","year":"2003","author":"qu","key":"ref27"},{"journal-title":"These Devices May Be Spying On You (Even In Your Own Home)","year":"2014","author":"steinberg","key":"ref3"},{"journal-title":"IJTAG - IEEE P1687","year":"2012","key":"ref6"},{"journal-title":"IEEE Standard for Test Access Port and Boundary-Scan Architecture","year":"2013","key":"ref5"},{"key":"ref8","article-title":"Hardware Trojan detection using path delay fingerprinting","author":"jin","year":"2008","journal-title":"Hardware-Oriented Security and Trust IEEE International Workshop on"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2009.5118357"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2014.7001384"},{"key":"ref9","article-title":"A Novel Circuit Authentication Scheme based on Partial Polymorphic Gates","author":"wang","year":"2017","journal-title":"Proceedings 22th Asia and South Pacific Design Automation Conference (ASP-DAC)"},{"journal-title":"Christopher Clearfield Why The FTC Can't Regulate The Internet Of Things","year":"2013","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1993.580166"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2455338"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2012.6401555"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2005.62"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2391266"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2011.5763228"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2002.1041802"}],"event":{"name":"2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2018,3,19]]},"location":"Dresden, Germany","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337149\/8341968\/08342056.pdf?arnumber=8342056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T14:30:48Z","timestamp":1525789848000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8342056\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.23919\/date.2018.8342056","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}