{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:45:16Z","timestamp":1730281516980,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/mcsoc.2019.00052","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T19:07:27Z","timestamp":1574708847000},"page":"320-327","source":"Crossref","is-referenced-by-count":3,"title":["Enhanced ID Authentication Scheme Using FPGA-Based Ring Oscillator PUF"],"prefix":"10.1109","author":[{"given":"Van-Toan","family":"Tran","sequence":"first","affiliation":[]},{"given":"Quang-Kien","family":"Trinh","sequence":"additional","affiliation":[]},{"given":"Van-Phuc","family":"Hoang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225055"},{"key":"ref11","first-page":"55","article-title":"From statistics to circuits: Foundations for future physical unclonable functions","author":"inyoung","year":"2010","journal-title":"Towards Hardware-Intrinsic Security"},{"key":"ref12","article-title":"LISA: Maximizing RO PUF's secret extraction","author":"chi-en daniel","year":"2010","journal-title":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2011.6122368"},{"journal-title":"CMOS VLSI Design A Circuits and Systems Perspective","year":"2010","author":"weste","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41395-7"},{"key":"ref4","article-title":"Circuit-level techniques for reliable physically uncloneable functions","author":"vignesh","year":"2009","journal-title":"2009 IEEE International Workshop on Hardware-Oriented Security and Trust host"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref6","article-title":"A highly flexible ring oscillator PUF","author":"mingze","year":"2014","journal-title":"Proceedings of the 51st Annual Design Automation Conference"},{"key":"ref5","first-page":"375","article-title":"Improved ring oscillator PUF: An FPGA-friendly secure primitive","author":"abhranil","year":"2011","journal-title":"Journal of cryptology 1 2"},{"journal-title":"Kendall Syndrome Coding (KSC) for group-based Ring-Oscillator Physical Unclonable Functions","year":"2011","author":"chi-en","key":"ref8"},{"key":"ref7","first-page":"48","article-title":"Secure and robust error correction for physical unclonable functions","volume":"27 1","author":"meng-day","year":"2010","journal-title":"IEEE Design & Test of Computers"},{"key":"ref2","article-title":"Physically unclonable functions: Constructions, properties and applications","author":"roel","year":"2012","journal-title":"Katholieke Univ Leuven"},{"key":"ref1","article-title":"Advantages of FPGA-based multiprocessor systems in industrial applications","author":"ralf","year":"2005","journal-title":"31st Annual Conference of IEEE Industrial Electronics Society 2005 IECON 2005"},{"key":"ref9","article-title":"Improving PUF security with regression-based distiller","author":"chi-en daniel","year":"2013","journal-title":"Proceedings of the 50th Annual Design Automation Conference"}],"event":{"name":"2019 IEEE 13th International Symposium on Embedded Multicore\/Many-core Systems-on-Chip (MCSoC)","start":{"date-parts":[[2019,10,1]]},"location":"Singapore, Singapore","end":{"date-parts":[[2019,10,4]]}},"container-title":["2019 IEEE 13th International Symposium on Embedded Multicore\/Many-core Systems-on-Chip (MCSoC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8893993\/8906509\/08906761.pdf?arnumber=8906761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:49:01Z","timestamp":1658094541000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8906761\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/mcsoc.2019.00052","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}