{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:13:31Z","timestamp":1753600411656},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017002"},{"type":"electronic","value":"9783030017019"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_19","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T12:03:08Z","timestamp":1545998588000},"page":"338-357","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Birds of a Feather Flock Together: Fuzzy Extractor and Gait-Based Robust Group Secret Key Generation for Smart Wearables"],"prefix":"10.1007","author":[{"given":"Chitra","family":"Javali","sequence":"first","affiliation":[]},{"given":"Girish","family":"Revadigar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"19_CR1","unstructured":"Bluetooth Low Energy Specification. https:\/\/www.bluetooth.com . Accessed 21 Feb 2018"},{"key":"19_CR2","unstructured":"Continua Health Alliance. http:\/\/www.continuaalliance.org . Accessed 21 Feb 2018"},{"key":"19_CR3","unstructured":"FastICA Java Library. http:\/\/sourceforge.net\/projects\/fastica\/ . Accessed 21 Feb 2018"},{"key":"19_CR4","unstructured":"Fitness Ttrackers. http:\/\/www.wareable.com . Accessed 21 Feb 2018"},{"key":"19_CR5","unstructured":"IEEE 802.15 WPAN Task Group 6 (TG6) Body Area Networks. http:\/\/www.ieee802.org\/15\/pub\/TG6.html . Accessed 21 Feb 2018"},{"key":"19_CR6","unstructured":"Moto E2 Phone. https:\/\/www.motorola.com . Accessed 21 Feb 2018"},{"key":"19_CR7","unstructured":"Samsung Smart Watch. https:\/\/www.samsung.com . Accessed 21 Feb 2018"},{"key":"19_CR8","unstructured":"Smart Glasses. https:\/\/www.vuzix.com\/Products\/M100-Smart-Glasses . Accessed 21 Feb 2018"},{"key":"19_CR9","unstructured":"Wearable Tech: A Developer\u2019s Security Nightmare. https:\/\/developers.redhat.com . Accessed 21 Feb 2018"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-540-74853-3_18","volume-title":"UbiComp 2007: Ubiquitous Computing","author":"D Bichler","year":"2007","unstructured":"Bichler, D., Stromberg, G., Huemer, M., L\u00f6w, M.: Key generation based on acceleration data of shaking processes. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 304\u2013317. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74853-3_18"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Boyen, X.: Reusable cryptographic fuzzy extractors. In: CCS (2004)","DOI":"10.1145\/1030083.1030096"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11426639_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X Boyen","year":"2005","unstructured":"Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147\u2013163. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_9"},{"key":"19_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"TM Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, New York (1991)"},{"issue":"1","key":"19_CR14","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Gafurov, D., Snekkenes, E., Buvarp, T.E.: Robustness of biometric gait authentication against impersonation attack. In: OTM Confederated International Workshops (2006)","DOI":"10.1007\/11915034_71"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Groza, B., Mayrhofer, R.: SAPHE: simple accelerometer based wireless pairing with heuristic trees. In: MoMM (2012)","DOI":"10.1145\/2428955.2428989"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/3-540-45427-6_10","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"LE Holmquist","year":"2001","unstructured":"Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.-W.: Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 116\u2013122. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45427-6_10"},{"issue":"3","key":"19_CR18","first-page":"626","volume":"10","author":"A Hyv\u00e4rinen","year":"1999","unstructured":"Hyv\u00e4rinen, A.: Fast and robust fixed-point algorithms for independent component analysis. IEEE TNN 10(3), 626\u2013634 (1999)","journal-title":"IEEE TNN"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Javali, C., Revadigar, G., Ding, M., Jha, S.: Secret key generation by virtual link estimation. In: BodyNets (2015)","DOI":"10.4108\/eai.28-9-2015.2261448"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-319-13066-8_5","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"C Javali","year":"2014","unstructured":"Javali, C., Revadigar, G., Libman, L., Jha, S.: SeAK: secure authentication and key generation protocol based on dual antennas for wireless body area networks. In: Saxena, N., Sadeghi, A.-R. (eds.) RFIDSec 2014. LNCS, vol. 8651, pp. 74\u201389. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13066-8_5"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Javali, C., Revadigar, G., Rasmussen, K.B., Hu, W., Jha, S.: I am alice, i was in wonderland: secure location proof generation and verification protocol. In: IEEE LCN (2016)","DOI":"10.1109\/LCN.2016.126"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Kuruwatti, N., Nayana, N.Y., Sarole, N., Revadigar, G., Javali, C.: LQI-key: symmetric key generation scheme for internet-of-things (IoT) devices using wireless channel link quality. In: ICAECC (2018)","DOI":"10.1109\/ICAECC.2018.8479465"},{"key":"19_CR23","unstructured":"Li, Q., Guo, M., Chang, E.C.: Fuzzy extractors for asymmetric biometric representations. In: CVPRW (2008)"},{"key":"19_CR24","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1007\/978-3-642-04020-7_70","volume-title":"Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence","author":"L-F Liu","year":"2009","unstructured":"Liu, L.-F., Jia, W., Zhu, Y.-H.: Survey of gait recognition. In: Huang, D.-S., Jo, K.-H., Lee, H.-H., Kang, H.-J., Bevilacqua, V. (eds.) ICIC 2009. LNCS (LNAI), vol. 5755, pp. 652\u2013659. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04020-7_70"},{"issue":"6","key":"19_CR25","first-page":"792","volume":"8","author":"R Mayrhofer","year":"2009","unstructured":"Mayrhofer, R., Gellersen, H.: Shake well before use: intuitive and secure pairing of mobile devices. IEEE TMC 8(6), 792\u2013806 (2009)","journal-title":"IEEE TMC"},{"key":"19_CR26","unstructured":"Mjaaland, B., Bours, P., Gligoroski, D.: Gait mimicking - attack resistance testing of gait authentication systems. In: NISK (2009)"},{"key":"19_CR27","unstructured":"NIST: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (2010)"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Revadigar, G., Javali, C., Asghar, H.J., Rasmussen, K.B., Jha, S.: Mobility independent secret key generation for wearable health-care devices. In: BodyNets (2015)","DOI":"10.4108\/eai.28-9-2015.2261446"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Revadigar, G., Javali, C., Hu, W., Jha, S.: DLINK: dual link based radio frequency fingerprinting for wearable devices. In: IEEE LCN (2015)","DOI":"10.1109\/LCN.2015.7366327"},{"issue":"10","key":"19_CR30","first-page":"2467","volume":"12","author":"G Revadigar","year":"2017","unstructured":"Revadigar, G., Javali, C., Xu, W., Vasilakos, A.V., Hu, W., Jha, S.: Accelerometer and fuzzy vault-based secure group key generation and sharing protocol for smart wearables. IEEE TIFS 12(10), 2467\u20132482 (2017)","journal-title":"IEEE TIFS"},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Shi, L., Yuan, J., Yu, S., Li, M.: ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. In: WiSec (2013)","DOI":"10.1145\/2462096.2462123"},{"issue":"3","key":"19_CR32","first-page":"503","volume":"2","author":"Y Sutcu","year":"2007","unstructured":"Sutcu, Y., Li, Q., Memon, N.: Protecting biometric templates with sketch: theory and practice. IEEE TIFS 2(3), 503\u2013512 (2007)","journal-title":"IEEE TIFS"},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Sutcu, Y., Li, Q., Memon, N.: Secure biometric templates from fingerprint-face features. In: IEEE CVPR, pp. 1\u20136 (2007)","DOI":"10.1109\/CVPR.2007.383385"},{"issue":"1","key":"19_CR34","first-page":"60","volume":"14","author":"KK Venkatasubramanian","year":"2010","unstructured":"Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: PSKA: usable and secure key agreement scheme for body area networks. IEEE TITB 14(1), 60\u201368 (2010)","journal-title":"IEEE TITB"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Voris, J., Saxena, N., Halevi, T.: Accelerometers and randomness: perfect together. In: WiSec (2011)","DOI":"10.1145\/1998412.1998433"},{"issue":"1","key":"19_CR36","first-page":"6:1","volume":"13","author":"W Xu","year":"2017","unstructured":"Xu, W., Javali, C., Revadigar, G., Luo, C., Bergmann, N., Hu, W.: Gait-key: a gait-based shared secret key generation protocol for wearable devices. ACM TOSN 13(1), 6:1\u20136:27 (2017)","journal-title":"ACM TOSN"},{"key":"19_CR37","first-page":"65390L","volume":"6539","author":"X Zhou","year":"2007","unstructured":"Zhou, X.: Template protection and its implementation in 3D face recognition systems. SPIE 6539, 65390L (2007)","journal-title":"SPIE"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T01:17:28Z","timestamp":1573607848000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_19","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}