{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:32:08Z","timestamp":1730277128794,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/isvlsi.2018.00117","type":"proceedings-article","created":{"date-parts":[[2018,8,9]],"date-time":"2018-08-09T22:11:51Z","timestamp":1533852711000},"page":"614-619","source":"Crossref","is-referenced-by-count":1,"title":["Design-Based Fingerprinting Using Side-Channel Power Analysis for Protection Against IC Piracy"],"prefix":"10.1109","author":[{"given":"James","family":"Shey","sequence":"first","affiliation":[]},{"given":"Naghmeh","family":"Karimi","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Robucci","sequence":"additional","affiliation":[]},{"given":"Chintan","family":"Patel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref11","first-page":"51","article-title":"Hardware trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"IEEE Int Workshop on Hardware-Oriented Security and Trust"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISVDAT.2016.8064895"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2727985"},{"journal-title":"IEEE Int Symp on Circuits and Syst (ISCAS)","article-title":"A neutral netlist of 10 combinational benchmark circuits and a targeted translator in FORTRAN","year":"1985","author":"brglez","key":"ref14"},{"journal-title":"Nangate FreePDK45 Open Cell Library","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2013.2255127"},{"key":"ref17","first-page":"1","article-title":"Approximating the age of RF\/analog circuits through re-characterization and statistical estimation","author":"chang","year":"2014","journal-title":"Proc Design Automation and Test in Europe (DATE) Conf"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2011.2168604"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/72.991427","article-title":"A comparison of methods for multiclass support vector machines","volume":"13","author":"hsu","year":"2002","journal-title":"IEEE Trans Neural Netw"},{"key":"ref4","first-page":"1186","article-title":"Watermarking system for IC design IP protection","volume":"2","author":"ni","year":"2004","journal-title":"IEEE Int Commun Circuits Syst Conf"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CADGRAPHICS.2015.53"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1363","DOI":"10.1109\/TCAD.2002.804205","article-title":"Publicly detectable watermarking for intellectual property authentication in VLSI design","volume":"21","author":"qu","year":"2002","journal-title":"IEEE Trans Comput -Aided Design Integr Circuits Syst"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562128"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8053049"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC.2014.6948949"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2002.1010594"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2011.6105421"}],"event":{"name":"2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","start":{"date-parts":[[2018,7,8]]},"location":"Hong Kong","end":{"date-parts":[[2018,7,11]]}},"container-title":["2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8428827\/8429321\/08429438.pdf?arnumber=8429438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T16:22:04Z","timestamp":1643214124000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8429438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/isvlsi.2018.00117","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}