{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:40:49Z","timestamp":1732034449643,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/vlsid.2013.222","type":"proceedings-article","created":{"date-parts":[[2013,3,20]],"date-time":"2013-03-20T18:43:28Z","timestamp":1363805008000},"page":"203-208","source":"Crossref","is-referenced-by-count":23,"title":["Emerging Frontiers in Embedded Security"],"prefix":"10.1109","author":[{"given":"Mehran Mozaffari","family":"Kermani","sequence":"first","affiliation":[]},{"given":"Meng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Raghunathan","sequence":"additional","affiliation":[]},{"given":"Niraj K.","family":"Jha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"year":"0","key":"35"},{"key":"17","first-page":"104","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","volume":"1109","author":"kocher","year":"1996","journal-title":"Proc Int Cryptology Conf"},{"journal-title":"Bluetooth Application Programming with the Java APIs Essentials Edition","year":"2008","author":"thompson","key":"36"},{"key":"18","first-page":"29","article-title":"The em side-channel(s)","author":"agrawal","year":"2002","journal-title":"Proc Workshop Cryptographic Hardware and Embedded Systems"},{"key":"33","first-page":"81","article-title":"Analysis and design of a hardware\/software trusted platform module for embedded systems","volume":"8","author":"aaraj","year":"2009","journal-title":"ACM Trans Embed Comput Syst"},{"journal-title":"Intel-Health-Guide","year":"2011","key":"15"},{"year":"0","key":"34"},{"key":"16","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proc Int Cryptology Conf"},{"journal-title":"Z-Wave System Design Specification Z-Wave Protocol Overview","year":"0","key":"39"},{"journal-title":"Can Your Insulin Pump Be Hacked?","year":"2012","author":"carollo","key":"13"},{"journal-title":"Infected Apps Found in Google's Android Market","year":"2011","key":"14"},{"journal-title":"Wi-Fi","year":"0","key":"37"},{"key":"11","article-title":"Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system","author":"li","year":"2011","journal-title":"Proc IEEE Int Conf e-Health Networking Applications and Services"},{"journal-title":"ZigBee","year":"0","key":"38"},{"journal-title":"Implantable Medical Devices Hacks and Countermeasures","year":"2011","author":"purvis","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2007.346152"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/S0002-9149(01)01700-3"},{"key":"41","first-page":"1","article-title":"Challenges in access right assignment for secure home networks","author":"kim","year":"2010","journal-title":"Proceedings of the 5th USENIX Conference on Hot Topics in Security"},{"journal-title":"Home Designer Essentials","year":"0","key":"40"},{"key":"22","first-page":"100","article-title":"Eavesdropping attacks on highfrequency RFID tokens","author":"hancke","year":"2008","journal-title":"Proc Workshop RFID Security"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5116816"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653712"},{"key":"25","article-title":"Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices","author":"schechter","year":"2010","journal-title":"Microsoft Research Tech Rep MSR-TR-2010-33"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"27","first-page":"1","article-title":"Absence makes the heart grow fonder: New directions for implantable medical device security","author":"denning","year":"2008","journal-title":"Proc 3rd Conf Hot Topics in Security"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018438"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00019-X"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.1012340"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"1","first-page":"753","article-title":"Security as a new dimension in embedded system design","author":"kocher","year":"2004","journal-title":"Proceedings 41st Design Automation Conference 2004 DAC"},{"year":"0","key":"30"},{"journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C (2nd Ed )","year":"1995","author":"schneier","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1795194.1795214"},{"year":"0","key":"32"},{"journal-title":"Body Area Networks1","year":"0","key":"5"},{"year":"0","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358911"},{"key":"9","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.comcom.2010.05.013","article-title":"TinyPBC: Pairings for authenticated identitybased non-interactive key distribution in sensor networks","volume":"34","author":"oliveira","year":"2011","journal-title":"Comput Commun"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"}],"event":{"name":"2013 26th International Conference on VLSI Design: concurrently with the 12th International Conference on Embedded Systems","start":{"date-parts":[[2013,1,5]]},"location":"Pune, India","end":{"date-parts":[[2013,1,10]]}},"container-title":["2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6472449\/6472603\/06472640.pdf?arnumber=6472640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T09:43:58Z","timestamp":1498038238000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6472640\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/vlsid.2013.222","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}