{"id":3736,"date":"2021-06-08T02:44:18","date_gmt":"2021-06-08T02:44:18","guid":{"rendered":"https:\/\/www.pufsecurity.com\/?post_type=dlp_document&p=3736"},"modified":"2022-07-04T10:30:33","modified_gmt":"2022-07-04T10:30:33","slug":"talk-chip-fingerprints-realize-safer-chip-applications-and-services","status":"publish","type":"dlp_document","link":"https:\/\/www.pufsecurity.com\/zh-hans\/document\/talk-chip-fingerprints-realize-safer-chip-applications-and-services\/","title":{"rendered":"Talk: Chip Fingerprints Realize Safer Chip Applications and Services"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":1848,"template":"","doc_tags":[201,204,203,208,207,200,205],"class_list":["post-3736","dlp_document","type-dlp_document","status-publish","has-post-thumbnail","hentry","doc_categories-video","doc_tags-crypto-coprocessor","doc_tags-hardware-security","doc_tags-puf","doc_tags-pufcc","doc_tags-risc-v-architechure","doc_tags-root-of-trust","doc_tags-zero-trust"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/dlp_document\/3736"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/dlp_document"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/types\/dlp_document"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/users\/8"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/media\/1848"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=3736"}],"wp:term":[{"taxonomy":"doc_tags","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hans\/wp-json\/wp\/v2\/doc_tags?post=3736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}