{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期部分”:[[2024,6,8]],“日期时间”:“2024-06-08T15:21:32Z”,“时间戳”:1717860092247},“引用计数”:23,“发布者”:“IEEE”,“内容域”:{“域”:[],“交叉标记限制”:false},”短容器时间“:[]”,“发布-发布int“:{“date-parts”:[[2012,5]]},“DOI”:“10.1109\/spw.2012.16”,“type”:“procesdings-article”,“created”:{“date-parts”:[[2012,7,10]],“date-time”:“2012-07-10T21:39:25Z”,“timestamp”:1341956365000},“source”:”Crossref“,“is-referenced-by-count”:18,“title”:[“理论分析:物理不可克隆函数和软件保护问题”],“prefix”:“10.1108”,“author”:[{“给定”:“Rishab”,“family”:“Nithyand”,“sequence”:“first”,“affiliation”:[]},{“given”:“John”,“faily”:”Solis“,“segment”:“additional”,“ffiliation”:[]}],“member”:“263”,“reference”:[{“key”:”19“first-page”:“160”,“article-title”:“guards保护软件代码”,“author”:“chang”,“year”:“2001”,“journal-title“:”“Digital Rights Management Workshop”},:“22”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ISIT.2004.1365176”},{“key”:“17”,“doo-asserted-by”:”publisher“,”doi“:”10.1145\/233551.233553“},“key“:”23“,”doi-assert-by“:”publiser“,doi“:”10.1007\/3-540-44647-8_1“,”文章标题“:”关于(im)混淆程序的可能性”,“卷”:“2139”,“作者”:“巴拉克”,“年份”:“2001”,“新闻标题”:“计算机科学讲义”},{“关键字”:“15”,“卷宗”:“148”,“作家”:“考尔伯格”,“年”:“1997”,“期刊标题”:”混淆转换的分类法“},}“key”:“16”,“author”:“wang”,“年度”:“2000”,“杂志标题”:生存机制的安全体系结构“},{“key”:“13”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/3-540-39799-X13”},}“密钥”:“14”,“doi-assertd-by”:“publisher”,“DI:”10.1016\/0167-4048(93)90054-9 176287“,”文章标题“:”受控物理随机函数“,”author“:”gassend“,”year“:”2002“,”journal-title“:”Computer Security Applications Conferences 2002 Proceedings 18th Annual“},{“key”:“12”,“author”:“kent”,“year”:“1980”,“journal-title”:“Protecting Externally Supplied Software in Small Computers”},”{“密钥”:“21”,“doi-asserted-by”:“crossref”,“first page”:”3“,“doi”:“10.1007\/978-3-642-14452-3_1“,”article-title“:”物理上不可克隆的功能:最新技术和未来研究方向的研究“,”author“:”maes“,”year“:”2010“,”journal-title”:“Towards Hardware-Intrinsic Security”},{“key”:“3”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/586110.586132”}.,{”key“:“20”,”artice-title:“On the Foundations of Physical Unclonable Functions”,“author”:“ruhrmair”,“year”:“0”,“journal-title”:“Cryptology EPrint Archive Report 2009\/389”},{“key”:“2”,“doi-asserted-by”:“publisher”,“doi”:“10.1126\/science.1074376”}ted-by“:”publisher“,”DOI“:”10.1007\/978-3-540-69861-6_10“},{“key”:“7”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1109\/ISCAS.2008.4542135”},},“key“:”6“,”DOI-assert-by“:”publisher:“10.1007\/978-3-540-74735-2_5”,“文章标题”:“Fpga内在puf及其在ip保护中的应用“,”author“:”guajardo“,”year“:”2007“,”journal-title“:”Cryptographic Hardware and Embedded Systems-CHES 2007“},{“key”:“4”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TVLSI.2005.859470”},“key“:”9“,”doi-assert-by“:”crossref“,”first page“:“369”,”“doi“:”10.1007\/11894063_29“,文章标题“:”保护涂层的可读硬件”,“卷”:“4249”,“作者”:“tuyls”,“年份”:“2006”,“日志标题”:“计算机科学课堂讲稿”},{“key”:“8”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ISCAS.2008.4542137”}],“event”:{“name”:“2012 IEEE Security and Privacy Workshops(SPW)”,“location”:“San Francisco,CA,USA”,“start”:date-parts“:[[2012,5,24]]},”end“:{”date-part“:[2012,5,25]]}},“container-title”:[“2012 IEEE安全与隐私研讨会”],“原始标题”:[],“链接”:[{“URL”:“http://\explorestaging.IEEE.org\/ielx5\/6226981\/6227677\/06227678.pdf?arnumber=6227678”,“内容类型”:“未指定”,“content-version”:“vor”,“预期应用程序”:相似性检查“}”,“存放”:{“日期部分”:[[2017,6,20]],“日期时间”:“2017-06-20T21:11:25Z”,“时间戳”:1497993085000},“分数”:1,“资源”:{“主要”:}“URL”:“http://ieeexplore.iee.org\/document\/6227678\/”},”副标题“[]”,“短标题”:[],“发布”:{-“日期部分“:[[2012,5]]},“references-count”:23,“URL”:“http:\/\/dx.doi.org\/10.109\/spw.2012.16“,”关系“:{},”主题“:[],”发布“:{”日期部分“:[[2012,5]]}}}