{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T15:20:12Z","timestamp":1648999212603},"reference-count":27,"publisher":"Oxford University Press (OUP)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2,1]]},"DOI":"10.1093\/comjnl\/bxx051","type":"journal-article","created":{"date-parts":[[2017,5,24]],"date-time":"2017-05-24T11:08:34Z","timestamp":1495624114000},"page":"223-232","source":"Crossref","is-referenced-by-count":0,"title":["Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN"],"prefix":"10.1093","volume":"61","author":[{"given":"I","family":"Karthiga","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering B. S. Abdur Rahman University, Chennai, India"}]},{"given":"Sharmila","family":"Sankar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering B. S. Abdur Rahman University, Chennai, India"}]}],"member":"286","published-online":{"date-parts":[[2017,5,24]]},"reference":[{"key":"key\n\t\t\t\t2018103003403995300_bxx051C1","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","article-title":"Data security and privacy in wireless body area networks","volume":"17","author":"Li","year":"2010","journal-title":"IEEE Wirel. Commun."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C2","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/JBHI.2014.2313374","article-title":"Priority-based time-slot allocation in wireless body area networks during medical emergency situations: an evolutionary game-theoretic perspective","volume":"19","author":"Misra","year":"2015","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C3","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1049\/iet-net.2014.0009","article-title":"Random room mobility model and extra-wireless body area network communication in hospital buildings","volume":"4","author":"Misra","year":"2015","journal-title":"IET Netw."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C4","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","article-title":"Data security and privacy in wireless body area networks","volume":"17","author":"Li","year":"2010","journal-title":"IEEE Wirel. Commun."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C5","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/TITB.2010.2042608","article-title":"A novel middleware solution to improve ubiquitous healthcare systems aided by affective information","volume":"14","author":"Taleb","year":"2010","journal-title":"IEEE. Trans. Inf. Technol. Biomed."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C6","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1109\/TITB.2010.2049268","article-title":"neurIST: infrastructure for advanced disease management through integration of heterogeneous data, computing, and complex processing services","volume":"14","author":"Benkner","year":"2010","journal-title":"IEEE. Trans. Inf. Technol. Biomed."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C7","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1109\/JBHI.2014.2370952","article-title":"Big heart data: advancing health informatics through data sharing in cardiovascular imaging","volume":"19","author":"Suinesiaputra","year":"2015","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C8","author":"Foran","year":"1995"},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C9","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MNET.2013.6616116","article-title":"Cloud-enabled wireless body area networks for pervasive healthcare","volume":"27","author":"Wan","year":"2013","journal-title":"IEEE Netw."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0121-2","article-title":"QoS-aware health monitoring system using cloud-based WBANs","volume":"38","author":"Almashaqbeh","year":"2014","journal-title":"J. Med. Syst."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C11","author":"Li","year":"2010"},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C12","first-page":"240","article-title":"Green and sustainable cyber-physical security solutions for body area networks","author":"Venkatasubramanian","year":"2009","journal-title":"Body Sens. Netw."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C13","author":"Fan","year":"2010"},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C14","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1186\/1687-1499-2013-216","article-title":"Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications","volume":"2013","author":"Ali","year":"2013","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C15","author":"Liu","year":"2010"},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C16","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/TITB.2009.2037617","article-title":"PSKA: usable and secure key agreement scheme for body area networks","volume":"14","author":"Venkatasubramanian","year":"2010","journal-title":"IEEE. Trans. Inf. Technol. Biomed."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C17","author":"Kova\u010devi\u0107","year":"2013"},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C18","author":"Hu","year":"2013"},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C19","author":"Wang","year":"2011"},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C20","author":"Lee","year":"2014"},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C21","author":"Javali","year":"2014"},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C22","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1109\/JSYST.2011.2165597","article-title":"Secure stochastic ECG signals based on gaussian mixture model for e-healthcare systems","volume":"5","author":"Wang","year":"2011","journal-title":"IEEE Syst. J."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C23","author":"Ramli","year":"2013"},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C24","author":"Zhu","year":"2011"},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C25","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1016\/j.procs.2015.04.194","article-title":"An efficient cryptographic scheme for text message protection against brute force and cryptanalytic attacks","volume":"48","author":"Joshi","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C26","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1109\/TSMCB.2006.876168","article-title":"Analysis of brute-force break-ins of a palmprint authentication system","volume":"36","author":"Kong","year":"2006","journal-title":"IEEE. Trans. Syst. Man. Cybern. B Cybern."},{"key":"key\n\t\t\t\t2018103003403995300_bxx051C27"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/2\/223\/26192534\/bxx051.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T00:43:56Z","timestamp":1569372236000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/2\/223\/3861967"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,24]]},"references-count":27,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,5,24]]},"published-print":{"date-parts":[[2018,2,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx051","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,2]]},"published":{"date-parts":[[2017,5,24]]}}}