{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T05:54:42Z","timestamp":1715234082725},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/msp.2014.123","type":"journal-article","created":{"date-parts":[[2015,1,12]],"date-time":"2015-01-12T20:53:42Z","timestamp":1421096022000},"page":"97-101","source":"Crossref","is-referenced-by-count":16,"title":["Physical Unclonable Functions: A Primer"],"prefix":"10.1109","volume":"12","author":[{"given":"Todd","family":"Bauer","sequence":"first","affiliation":[{"name":"Sandia National Laboratories"}]},{"given":"Jason","family":"Hamlet","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581556"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"ref15","article-title":"Side-Channel Analysis of Physical Unclonable Functions (PUFs)","author":"schuster","year":"2010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711445"},{"key":"ref11","article-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","author":"rukhin","year":"2010"},{"key":"ref10","author":"hamlet","year":"2014","journal-title":"Deterrence of Device Counterfeiting Cloning and Subversion by Substitution Using Hardware Fingerprinting"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118491858737"},{"key":"ref1","author":"bauder","year":"1983","journal-title":"An Anti-counterfeiting Concept for Currency Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IPFA.2009.5232703"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855565"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581581"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2011.35"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176287"},{"key":"ref26","article-title":"SIA President Testifies at Senate Armed Services Committee on Dangers of Counterfeit Chips","author":"kazmierski","year":"2011"},{"key":"ref25","article-title":"Software Techniques to Combat Drift in PUF-Based Authentication Systems","author":"kirkpatrick","year":"0","journal-title":"InWorkshop on Secure Component and System Identification"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513106"},{"key":"ref22","article-title":"Red Hat and August Schell Run World's Largest PKI Installation on Red Hat Enterprise Linux","year":"2007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855582"},{"key":"ref27","article-title":"Background Memo: Senate Armed Services Committee Hearing on Counterfeit Electronic Parts in the DOD Supply Chain","year":"2011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998432"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1531542.1531639"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2007.4397343"},{"key":"ref4","first-page":"9","article-title":"Physical Unclonable Functions for Device Authentication and Secret Key Generation","author":"suh","year":"0","journal-title":"Proc Design Automation Conf"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref5","article-title":"Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags","author":"holcomb","year":"0","journal-title":"Proc RFID Security Conf"}],"container-title":["IEEE Security & Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013\/7006395\/07006435.pdf?arnumber=7006435","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T22:30:58Z","timestamp":1683066658000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7006435\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":27,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/msp.2014.123","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"value":"1540-7993","type":"print"},{"value":"1558-4046","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11]]}}}