{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T07:13:14Z","timestamp":1725779594458},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.23919\/date.2018.8342054","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T23:20:11Z","timestamp":1524525611000},"page":"467-472","source":"Crossref","is-referenced-by-count":13,"title":["Cost-efficient design for modeling attacks resistant PUFs"],"prefix":"10.23919","author":[{"given":"Mohd Syafiq","family":"Mispan","sequence":"first","affiliation":[]},{"given":"Haibo","family":"Su","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Zwolinski","sequence":"additional","affiliation":[]},{"given":"Basel","family":"Halak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2017.8031539"},{"key":"ref11","first-page":"156","article-title":"OPUF: Obfuscation logic based physical un-clonable function","author":"ye","year":"2015","journal-title":"IEEE International On-Line Testing Symposium"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2016.7835567"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PRIME.2015.7251345"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2940326"},{"journal-title":"Lightweight design for PUF resilient to model building attacks","year":"2017","author":"kuang","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855565"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0522"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2015.7168791"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"ref5","first-page":"9","article-title":"Physical Unclonable Functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"ACM\/IEEE Design Automation Conference"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284683"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457162"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2300635"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2013.2279875"}],"event":{"name":"2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2018,3,19]]},"location":"Dresden, Germany","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337149\/8341968\/08342054.pdf?arnumber=8342054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T18:31:32Z","timestamp":1525804292000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8342054\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.23919\/date.2018.8342054","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}