{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:42:50Z","timestamp":1725795770990},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/glocom.2017.8255015","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:50:54Z","timestamp":1516038654000},"page":"1-5","source":"Crossref","is-referenced-by-count":11,"title":["New Plain-Text Authentication Secure Scheme for Implantable Medical Devices with Remote Control"],"prefix":"10.1109","author":[{"given":"Taha","family":"Belkhouja","sequence":"first","affiliation":[]},{"given":"Xiaojang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Amr","family":"Mohamed","sequence":"additional","affiliation":[]},{"given":"Abdulla K.","family":"Al-Ali","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.090413.130072"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567115"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5685228"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.071278"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214179"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2266116"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883666"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7054729"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113232"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.195"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"ref27","article-title":"Smart Cities: A Survey on Data Management, Security and Enabling Technologies","author":"gharaibeh","year":"2015","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2016.7564976"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018438"},{"key":"ref8","article-title":"Hijacking an Insulin Pump: Security Attacks and Defenses for a Diabetes Therapy System","author":"li","year":"2011","journal-title":"IEEE 13th International Conference on E-Health Networking Applications and Services"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857746"},{"journal-title":"Medfusion 4000 Wireless Syringe Infusion Pump","year":"0","key":"ref2"},{"journal-title":"Handbook of Applied Cryptography","year":"2001","author":"menezes","key":"ref9"},{"key":"ref1","article-title":"Access Control Schemes for Implantable Medical Devices: A Survey","author":"wu","year":"2016","journal-title":"IEEE Wireless Communications and Networking Conference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935179"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/9781118722367"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516658"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653712"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744928"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2460747"},{"key":"ref25","article-title":"Body area network security: robust key establishment using human body channel","author":"chang","year":"2012","journal-title":"Proc of the USENIX Conference on Health Security and Privacy"}],"event":{"name":"2017 IEEE Global Communications Conference (GLOBECOM 2017)","start":{"date-parts":[[2017,12,4]]},"location":"Singapore","end":{"date-parts":[[2017,12,8]]}},"container-title":["GLOBECOM 2017 - 2017 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253768\/8253909\/08255015.pdf?arnumber=8255015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T19:15:46Z","timestamp":1519067746000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8255015\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/glocom.2017.8255015","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}