{"id":"https://openalex.org/W4385211623","doi":"https://doi.org/10.1109/mcna59361.2023.10185871","title":"Keynote Speech 3: Exploring the Synergy of 3D Integration and Hardware Security","display_name":"Keynote Speech 3: Exploring the Synergy of 3D Integration and Hardware Security","publication_year":2023,"publication_date":"2023-06-19","ids":{"openalex":"https://openalex.org/W4385211623","doi":"https://doi.org/10.1109/mcna59361.2023.10185871"},"language":"en","primary_location":{"id":"doi:10.1109/mcna59361.2023.10185871","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/mcna59361.2023.10185871","pdf_url":"https://ieeexplore.ieee.org/ielx7/10185659/10185643/10185871.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Multimedia Computing, Networking and Applications (MCNA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/10185659/10185643/10185871.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092532559","display_name":"Dofe Jaya","orcid":null},"institutions":[{"id":"https://openalex.org/I142934699","display_name":"California State University, Fullerton","ror":"https://ror.org/02avqqw26","country_code":"US","type":"education","lineage":["https://openalex.org/I142934699"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dofe Jaya","raw_affiliation_strings":["California State University,Computer Engineering Department,Fullerton,California,USA","Computer Engineering Department, California State University, Fullerton, California, USA"],"affiliations":[{"raw_affiliation_string":"California State University,Computer Engineering Department,Fullerton,California,USA","institution_ids":["https://openalex.org/I142934699"]},{"raw_affiliation_string":"Computer Engineering Department, California State University, Fullerton, California, USA","institution_ids":["https://openalex.org/I142934699"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5092532559"],"corresponding_institution_ids":["https://openalex.org/I142934699"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07079693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11527","display_name":"3D IC and TSV technologies","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11527","display_name":"3D IC and TSV technologies","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10783","display_name":"Additive Manufacturing and 3D Printing Technologies","score":0.9624000191688538,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9347000122070312,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sword","display_name":"SWORD","score":0.691832959651947},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.643479585647583},{"id":"https://openalex.org/keywords/power-consumption","display_name":"Power consumption","score":0.574163019657135},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5531983971595764},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.5344580411911011},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.493571400642395},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4914318323135376},{"id":"https://openalex.org/keywords/three-dimensional-integrated-circuit","display_name":"Three-dimensional integrated circuit","score":0.4632578492164612},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.4288581609725952},{"id":"https://openalex.org/keywords/transistor","display_name":"Transistor","score":0.42047247290611267},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4162844121456146},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3740055561065674},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28403735160827637},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.23951572179794312},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.22253790497779846},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2204735279083252},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.20198750495910645},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10857591032981873}],"concepts":[{"id":"https://openalex.org/C2781424646","wikidata":"https://www.wikidata.org/wiki/Q7395200","display_name":"SWORD","level":2,"score":0.691832959651947},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.643479585647583},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.574163019657135},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5531983971595764},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.5344580411911011},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.493571400642395},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4914318323135376},{"id":"https://openalex.org/C59088047","wikidata":"https://www.wikidata.org/wiki/Q229370","display_name":"Three-dimensional integrated circuit","level":3,"score":0.4632578492164612},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.4288581609725952},{"id":"https://openalex.org/C172385210","wikidata":"https://www.wikidata.org/wiki/Q5339","display_name":"Transistor","level":3,"score":0.42047247290611267},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4162844121456146},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3740055561065674},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28403735160827637},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.23951572179794312},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.22253790497779846},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2204735279083252},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.20198750495910645},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10857591032981873},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mcna59361.2023.10185871","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/mcna59361.2023.10185871","pdf_url":"https://ieeexplore.ieee.org/ielx7/10185659/10185643/10185871.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Multimedia Computing, Networking and Applications (MCNA)","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1109/mcna59361.2023.10185871","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/mcna59361.2023.10185871","pdf_url":"https://ieeexplore.ieee.org/ielx7/10185659/10185643/10185871.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Multimedia Computing, Networking and Applications (MCNA)","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385211623.pdf","grobid_xml":"https://content.openalex.org/works/W4385211623.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2677867825","https://openalex.org/W4233474852","https://openalex.org/W1968957853","https://openalex.org/W2184778749","https://openalex.org/W86209285","https://openalex.org/W2040356166","https://openalex.org/W2315403924","https://openalex.org/W2100470915","https://openalex.org/W1493692093","https://openalex.org/W4385451819"],"abstract_inverted_index":{"As":[0],"the":[1,81,91,124,135],"demand":[2],"for":[3,37,98,137],"increased":[4],"transistor":[5],"density":[6],"and":[7,43,62,76,140],"performance":[8],"in":[9,79,131],"integrated":[10],"circuits":[11],"(ICs)":[12],"continues":[13],"to":[14,109,143],"surge,":[15],"three-dimensional":[16],"(3D)":[17],"integration":[18,33,72,97],"has":[19],"emerged":[20],"as":[21,53],"a":[22,68],"promising":[23],"technology.":[24],"By":[25],"moving":[26],"beyond":[27],"traditional":[28],"two-dimensional":[29],"(2D)":[30],"chips,":[31],"3D":[32,71,84,96,132],"unveils":[34],"new":[35],"avenues":[36],"computing":[38],"platforms,":[39],"including":[40],"high-performance":[41],"processors":[42],"enhanced":[44,63],"computation":[45,64],"density.":[46,65],"This":[47,86],"innovative":[48],"technology":[49,105],"offers":[50],"advantages":[51],"such":[52],"reduced":[54],"package":[55],"size,":[56],"lower":[57],"power":[58],"consumption,":[59],"improved":[60],"bandwidth,":[61],"However,":[66],"like":[67],"double-edged":[69],"sword,":[70],"also":[73],"brings":[74],"unique":[75],"unexplored":[77],"challenges":[78],"managing":[80],"security":[82,99,126],"of":[83],"ICs.":[85],"keynote":[87],"address":[88,144],"delves":[89],"into":[90],"novel":[92],"opportunities":[93],"presented":[94],"by":[95],"mechanisms.":[100],"It":[101],"explores":[102],"how":[103],"this":[104],"can":[106],"be":[107],"leveraged":[108],"strengthen":[110],"hardware":[111],"security,":[112],"enabling":[113],"robust":[114],"protection":[115],"against":[116],"evolving":[117],"threats.":[118],"Additionally,":[119],"it":[120],"sheds":[121],"light":[122],"on":[123],"potential":[125],"vulnerabilities":[127],"that":[128],"may":[129],"arise":[130],"ICs,":[133],"emphasizing":[134],"need":[136],"careful":[138],"consideration":[139],"proactive":[141],"measures":[142],"them.":[145]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
