{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:55:06Z","timestamp":1755838506359,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/ipsn.2016.7460726","type":"proceedings-article","created":{"date-parts":[[2016,4,28]],"date-time":"2016-04-28T20:19:26Z","timestamp":1461874766000},"page":"1-12","source":"Crossref","is-referenced-by-count":62,"title":["Walkie-Talkie: Motion-Assisted Automatic Key Generation for Secure On-Body Device Communication"],"prefix":"10.1109","author":[{"given":"Weitao","family":"Xu","sequence":"first","affiliation":[]},{"given":"Girish","family":"Revadigar","sequence":"additional","affiliation":[]},{"given":"Chengwen","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Neil","family":"Bergmann","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/438254"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593251"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.10.043"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366327"},{"key":"ref11","article-title":"Secret key generation by virtual link estimation","author":"javali","year":"2015","journal-title":"BodyNets' 2015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/0217014"},{"key":"ref15","article-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"rukhin","year":"2001","journal-title":"DTIC Document Tech Rep"},{"year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2004.09.041"},{"key":"ref18","article-title":"Single-channel speech separation using sparse non-negative matrix factorization","author":"schmidt","year":"0","journal-title":"INTERSPEECH'2006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2006.51"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.01.042"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.51"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516658"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/72.761722"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.12.048"},{"key":"ref5","volume":"46","author":"hyv\u00e4rinen","year":"2004","journal-title":"Independent Component Analysis"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594392"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobiquitous.2014.257920"},{"key":"ref2","first-page":"290","article-title":"Gait as a total pattern of movement: Including a bibliography on gait","volume":"46","author":"murray","year":"1967","journal-title":"American Journal of Physical Medicine & Rehabilitation"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24646-6_3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2009.41"},{"journal-title":"BodyNets' 2015","article-title":"Mobility independent secret key generation for wearable helth-care devices","year":"2015","key":"ref22"},{"key":"ref21","article-title":"Secret key generation for body-worn devices by inducing artificial randomness in the channel","author":"revadigar","year":"2015","journal-title":"Technical Report UNSW CSE TR"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2012.06.005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_18"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/964696.964713"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_10"}],"event":{"name":"2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN)","start":{"date-parts":[[2016,4,11]]},"location":"Vienna, Austria","end":{"date-parts":[[2016,4,14]]}},"container-title":["2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7459653\/7460653\/07460726.pdf?arnumber=7460726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T18:20:09Z","timestamp":1475086809000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7460726\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/ipsn.2016.7460726","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}