{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:08:21Z","timestamp":1730318901633,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[1999,6]]},"DOI":"10.1145\/309847.310080","type":"proceedings-article","created":{"date-parts":[[2003,11,14]],"date-time":"2003-11-14T17:36:23Z","timestamp":1068831383000},"page":"831-836","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Robust FPGA intellectual property protection through multiple small watermarks"],"prefix":"10.1145","author":[{"given":"John","family":"Lach","sequence":"first","affiliation":[{"name":"UCLA EE Department, 56-125B Engineering IV, Los Angeles, CA"}]},{"given":"William H.","family":"Mangione-Smith","sequence":"additional","affiliation":[{"name":"UCLA EE Department, 56-125B Engineering IV, Los Angeles, CA"}]},{"given":"Miodrag","family":"Potkonjak","sequence":"additional","affiliation":[{"name":"UCLA CS Department, 3532G Boelter Hall, Los Angeles, CA"}]}],"member":"320","published-online":{"date-parts":[[1999,6]]},"reference":[{"key":"e_1_3_2_1_1_2","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"volume-title":"International Conference on Multimedia Computing and Systems","year":"1996","author":"Boney L.","key":"e_1_3_2_1_2_2"},{"volume-title":"Custom Integrated Circuits Conference","year":"1998","author":"Charbon E.","key":"e_1_3_2_1_3_2"},{"volume-title":"International Conference on Image Processing","year":"1996","author":"Cox I.J.","key":"e_1_3_2_1_4_2"},{"key":"e_1_3_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.263419"},{"key":"e_1_3_2_1_6_2","first-page":"22","article-title":"New Directions on Cryptography","author":"Diffie W.","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"key":"e_1_3_2_1_7_2","first-page":"329","author":"Furber S.","year":"1996","journal-title":"Addison-Wesley"},{"key":"e_1_3_2_1_8_2","unstructured":"R. Goering \"IP98 Forum Exposes Struggling Industry -Undefined Business Models Unstable Core Prices Cited \" EE Times Issue 1000 March 30 1998.]] R. Goering \"IP98 Forum Exposes Struggling Industry -Undefined Business Models Unstable Core Prices Cited \" EE Times Issue 1000 March 30 1998.]]"},{"key":"e_1_3_2_1_9_2","first-page":"423","volume-title":"Springer Lecture Notes in Computer Science","volume":"1242","author":"Hartung F."},{"key":"e_1_3_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/309847.310085"},{"volume-title":"B YUcore: A MIPS R2000 Processor for FPGAs","year":"1997","author":"Hutchings B.","key":"e_1_3_2_1_11_2"},{"key":"e_1_3_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/277044.277241"},{"key":"e_1_3_2_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/277044.277240"},{"key":"e_1_3_2_1_14_2","doi-asserted-by":"crossref","unstructured":"J. Lach W. H. Mangione-Smith and M. Potkonjak \"Fingerprinting Digital Circuits on Programmable Hardware \" International Workshop on Information Hiding 1998 16-31.]] J. Lach W. H. Mangione-Smith and M. Potkonjak \"Fingerprinting Digital Circuits on Programmable Hardware \" International Workshop on Information Hiding 1998 16-31.]]","DOI":"10.1007\/3-540-49380-8_2"},{"key":"e_1_3_2_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/288548.288606"},{"key":"e_1_3_2_1_16_2","doi-asserted-by":"crossref","unstructured":"J. Leonard and W. H. Mangione-Smith \"A Case Study of Partially Evaluated Hardware Circuits: Key-Specific DES \" Field Programmable Logic 1997 151-160.]] J. Leonard and W. H. Mangione-Smith \"A Case Study of Partially Evaluated Hardware Circuits: Key-Specific DES \" Field Programmable Logic 1997 151-160.]]","DOI":"10.1007\/3-540-63465-7_220"},{"key":"e_1_3_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.1996.542315"},{"key":"e_1_3_2_1_18_2","unstructured":"B. Schneier 1963- Applied Cryptography: Protocols Algorithms and Source Code in C New York: John Wiley & Sons 1996.]] B. Schneier 1963- Applied Cryptography: Protocols Algorithms and Source Code in C New York: John Wiley & Sons 1996.]]"},{"key":"e_1_3_2_1_19_2","doi-asserted-by":"crossref","unstructured":"G.A. Spanos and T.B. Maples \"Performance Study of a Selective Encryption Scheme for the Security of Networked Real-Time Video \" International Conference on Computer Communications and Networks 1995.]] G.A. Spanos and T.B. Maples \"Performance Study of a Selective Encryption Scheme for the Security of Networked Real-Time Video \" International Conference on Computer Communications and Networks 1995.]]","DOI":"10.1109\/ICCCN.1995.540095"},{"volume-title":"International Conference on Image Processing","year":"1996","author":"Swanson M.D.","key":"e_1_3_2_1_20_2"},{"key":"e_1_3_2_1_21_2","article-title":"Data Hiding for Multimedia Personalization, Interaction, and Protection","volume":"41","author":"Tewfik A.H.","year":"1997","journal-title":"IEEE Signal Processing Magazine"},{"key":"e_1_3_2_1_22_2","unstructured":"J. Turley \"ARM Grabs Embedded Speed Lead \" Microprocessor Report vol. 10 1996.]] J. Turley \"ARM Grabs Embedded Speed Lead \" Microprocessor Report vol. 10 1996.]]"},{"key":"e_1_3_2_1_23_2","first-page":"70","volume-title":"Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines","author":"Villasenor J.","year":"1996"},{"key":"e_1_3_2_1_24_2","first-page":"219","article-title":"A Watermark for Digital Images","volume":"3","author":"Wolfgang R.B.","year":"1996","journal-title":"Applications of Total Automorphisms"},{"key":"e_1_3_2_1_25_2","unstructured":"Xilinx The Programmable Logic Data Book San Jose CA 1996.]] Xilinx The Programmable Logic Data Book San Jose CA 1996.]]"}],"event":{"name":"DAC99: The 36th ACM\/IEEE-CAS\/EDAC Design Automation Conference","sponsor":["EDAC Electronic Design Automation Consortium","SIGDA ACM Special Interest Group on Design Automation","IEEE-CAS Circuits & Systems"],"location":"New Orleans Louisiana USA","acronym":"DAC99"},"container-title":["Proceedings of the 36th annual ACM\/IEEE Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/309847.310080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T22:08:55Z","timestamp":1673042935000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/309847.310080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,6]]},"references-count":25,"alternative-id":["10.1145\/309847.310080","10.1145\/309847"],"URL":"https:\/\/doi.org\/10.1145\/309847.310080","relation":{},"subject":[],"published":{"date-parts":[[1999,6]]},"assertion":[{"value":"1999-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}