{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:45:35Z","timestamp":1742996735303,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031569494"},{"type":"electronic","value":"9783031569500"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56950-0_26","type":"book-chapter","created":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T03:01:57Z","timestamp":1711594917000},"page":"306-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A New Security Mechanism for IoT Devices: Electroencephalogram (EEG) Signals"],"prefix":"10.1007","author":[{"given":"Ahmet Furkan","family":"Aydogan","sequence":"first","affiliation":[]},{"given":"Cihan","family":"Varol","sequence":"additional","affiliation":[]},{"given":"Aysenur","family":"Vanli","sequence":"additional","affiliation":[]},{"given":"Hacer","family":"Varol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,29]]},"reference":[{"key":"26_CR1","unstructured":"Fruhlinger, J.: The OPM hack explained: Bad security practices meet China\u2019s Captain America. CSO Online (2018)"},{"issue":"3","key":"26_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3464307","volume":"3","author":"S Hussain","year":"2022","unstructured":"Hussain, S., et al.: Exposing vulnerabilities of deepfake detection systems with robust attacks. Digit. Threats Res. Pract. (DTRAP) 3(3), 1\u201323 (2022)","journal-title":"Digit. Threats Res. Pract. (DTRAP)"},{"key":"26_CR3","unstructured":"Hamilton-Nyu, K.:\u00a0Artificial Intelligence Fools Fingerprint Security Systems. Futurity (2018)"},{"key":"26_CR4","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/978-981-33-6984-9_32","volume-title":"Congress on Intelligent Systems, CIS 2020","author":"N Lata","year":"2021","unstructured":"Lata, N., Kumar, R.: Analysis of lightweight cryptography algorithms for IoT communication. In: Sharma, H., Saraswat, M., Yadav, A., Kim, J.H., Bansal, J.C. (eds.) Congress on Intelligent Systems, CIS 2020. Advances in Intelligent Systems and Computing, vol. 1335, pp. 397\u2013406. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-33-6984-9_32"},{"key":"26_CR5","unstructured":"Crane, C.:\u00a0Block Cipher Vs Stream Cipher: What They Are and How They Work.\u00a0Hashed Out by the SSL Store, 30 November 2021"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Fischer, M., Scheerhorn, A., Tonjes, R.:\u00a0Using attribute-based encryption on IoT devices with instant key revocation. In:\u00a02019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE (2019)","DOI":"10.1109\/PERCOMW.2019.8730784"},{"key":"26_CR7","unstructured":"Stallings, W:\u00a0Cryptography and Network Security: Principles and Practice,\u00a07th ed. Pearson (2016)"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Diffie, W., Hellman, M.E.:\u00a0New directions in cryptography.\u00a0In: IEEE Transactions on Information Theory, vol. 22(6), pp. 644\u201354. Institute of Electrical and Electronics Engineers (IEEE) (1976)","DOI":"10.1109\/TIT.1976.1055638"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.:\u00a0A method for obtaining digital signatures and public-key cryptosystems.\u00a0Commun. ACM, 21(2),\u00a0120\u2013126 (1978). Association for Computing Machinery (ACM)","DOI":"10.1145\/359340.359342"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Hussain, I., Negi, M.C., Pandey, N.:\u00a0Proposing an encryption\/ decryption scheme for IoT communications using binary-bit sequence and multistage encryption. In:\u00a02018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE (2018)","DOI":"10.1109\/ICRITO.2018.8748293"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-05149-9_1","volume-title":"Information Security Applications, WISA 2013","author":"D Hong","year":"2014","unstructured":"Hong, D., Lee, J.K., Kim, D.C., Kwon, D., Ryu, K.H., Lee, D.G.: LEA: A 128-Bit block cipher for fast encryption on common processors. In: Kim, Y., Lee, H., Perrig, A. (eds.) Information Security Applications, WISA 2013. Lecture Notes in Computer Science, vol. 8267, pp. 3\u201327. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05149-9_1"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Belguith, S., Kaaniche, N., Russello, G.:\u00a0PU-ABE: lightweight attribute-based encryption supporting access policy update for cloud assisted IoT. In:\u00a02018 IEEE 11th International Conference on Cloud Computing (CLOUD). IEEE (2018)","DOI":"10.1109\/CLOUD.2018.00137"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Jian, M.S., Cheng, Y.E., Shen, C.H.:\u00a0Internet of Things (IoT) cybersecurity based on the hybrid cryptosystem.\u00a0In:\u00a02019 21st International Conference on Advanced Communication Technology (ICACT). IEEE (2019)","DOI":"10.23919\/ICACT.2019.8701957"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Chandu, Y., Kumar, K.S.R., Prabhukhanolkar, N.V., Anish, A.N., Rawal, S.: Design and implementation of hybrid encryption for security of IOT data. In: 2017 International Conference on Smart Technologies for Smart Nation (SmartTechCon). IEEE (2017)","DOI":"10.1109\/SmartTechCon.2017.8358562"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Yang, W., Wang, S., Sahri, N.M., Karie, N.M., Ahmed, M., Valli, C.:\u00a0Biometrics for internet-of-things security: a review.\u00a0Sensors\u00a021(18), 6163 (2021)","DOI":"10.3390\/s21186163"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Hossain, M.S., Muhammad, G., Rahman, S.M.M., Abdul, W., Alelaiwi, A., Alamri, A.:\u00a0Toward end-to-end biometrics-based security for IoT infrastructure.\u00a0IEEE Wirel. Commun. 23(5), 44\u201351 (2016)","DOI":"10.1109\/MWC.2016.7721741"},{"key":"26_CR17","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/978-981-10-8681-6_54","volume-title":"International Conference on Computer Networks and Communication Technologies","author":"CG Sarika","year":"2019","unstructured":"Sarika, C.G., Bharathi, M.A., Harinath, H.N.: IoT-based smart login using biometrics. In: Smys, S., Bestak, R., Chen, J.Z., Kotuliak, I. (eds.) International Conference on Computer Networks and Communication Technologies. Lecture Notes on Data Engineering and Communications Technologies, vol. 15, pp. 589\u2013597. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-10-8681-6_54"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Golec, M., Gill, S.S., Bahsoon, R., Rana, O.: BioSec: a biometric authentication framework for secure and private communication among edge devices in IoT and industry 4.0. IEEE Consum. Electron. Magaz. 11(2), 51\u201356\u00a0(2020)","DOI":"10.1109\/MCE.2020.3038040"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the Second International Conference on Advances in Computing Research (ACR\u201924)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56950-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T03:13:32Z","timestamp":1711595612000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56950-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031569494","9783031569500"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56950-0_26","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acr2023a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iicser.org\/ACR24","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}