{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:18:08Z","timestamp":1762431488038,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.23919\/date.2018.8342252","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T23:20:11Z","timestamp":1524525611000},"page":"1504-1507","source":"Crossref","is-referenced-by-count":10,"title":["Trustworthy proofs for sensor data using FPGA based physically unclonable functions"],"prefix":"10.23919","author":[{"given":"Urbi","family":"Chatterjee","sequence":"first","affiliation":[]},{"given":"Durga Prasad","family":"Sahoo","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Rajat Subhra","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Mobile device identification via sensor fingerprinting","year":"2014","author":"bojinov","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.12"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.15439\/2014F140"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5220\/0005946702070214"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"20:1","DOI":"10.1145\/2940326","article-title":"Security analysis of arbiter PUF and its lightweight compositions under predictability test","volume":"22","author":"nguyen","year":"2017","journal-title":"ACM TODAES"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SAS.2016.7479841"},{"key":"ref12","first-page":"57","article-title":"Architectural bias: a novel statistical metric to evaluate arbiter PUF variants","volume":"2016","author":"sahoo","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2016.7835573"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2016.7835551"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513103"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917639"},{"journal-title":"Extracting secret keys from integrated circuits","year":"2004","author":"lim","key":"ref1"}],"event":{"name":"2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2018,3,19]]},"location":"Dresden, Germany","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337149\/8341968\/08342252.pdf?arnumber=8342252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T06:43:00Z","timestamp":1604212980000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8342252\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":12,"URL":"https:\/\/doi.org\/10.23919\/date.2018.8342252","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}