1. Constraint‐based watermarking techniques for design IP protection;Kahng A.B.;IEEE Trans. CAD Integr. Circuits Syst.,2001
2. Alkabani Y. Koushanfar F. Potkonjak M.: ‘Remote activation of ICs for privacy prevention and digital right management’.Proc. Int. Conf. on Computer‐Aided Design (ICCAD) 2007 pp.674–677
3. Huang J. Lach J.: ‘IC activation and user authentication for security‐sensitive systems’.Proc. Int. Symp. on Hardware‐Oriented Security and Trust 2008 pp.76–80
4. HARPOON: an obfuscation‐based SOC design methodology for hardware protection;Chakraborty R.S.;IEEE Trans. CAD Integr. Circuits Syst.,2009
5. Techniques for design and implementation of secure reconfigurable PUFs;Majzoobi M.;ACM Trans. Reconfigurable Technol. Syst.,2009