{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:47:38Z","timestamp":1761896858534,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iwcmc.2018.8450294","type":"proceedings-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T22:00:16Z","timestamp":1535666416000},"page":"762-767","source":"Crossref","is-referenced-by-count":2,"title":["A new protocol for an efficient and green biometric-based security key establishment in WBAN\u2019s"],"prefix":"10.1109","author":[{"given":"Amal","family":"Sammoud","sequence":"first","affiliation":[]},{"given":"Omessaad","family":"Hamdi","sequence":"additional","affiliation":[]},{"given":"Mohamed Aymen","family":"Chalouf","sequence":"additional","affiliation":[]},{"given":"Ammar","family":"Bouallegue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"73","article-title":"A Novel Biometrics Method to Secure Wireless Body Area Sensor Networks for Telemedicine and M-Health","author":"carmen","year":"2006","journal-title":"IEEE Communications Magazine"},{"key":"ref11","article-title":"Using the Timing Information of Heartbeats as an Entity Identifier to Secure Body Sensor Network","volume":"12","author":"bao","year":"2008","journal-title":"IEEE Transactions on Information Technology in Biomedecine"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5402\/2011\/692592"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2016.079172"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EUSIPCO.2015.7362349"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201712503006"},{"key":"ref17","first-page":"75","article-title":"Trust Key Management Scheme for Wireless Body Area Networks","volume":"12 2","author":"mana","year":"2011","journal-title":"IJ Network Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462123"},{"key":"ref19","first-page":"220","article-title":"Secure and fast digital signatures using BCH codes","author":"hamdi","year":"2006","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref4","first-page":"1","article-title":"Biometric methods for secure communications in body sensor networks: resource efficient key management and signal-level data scrambling","volume":"8","author":"bui","year":"2008","journal-title":"Eurasip Journal of Advances in Signal Processing"},{"key":"ref3","article-title":"Light-weight Security Architecture for IEEE 802.15.4 Body Area Networks","volume":"47","author":"meena abarna","year":"2012","journal-title":"International Journal of Computer Applications"},{"journal-title":"Security Issues in Biomedical WSN","year":"2008","author":"tassos","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600788"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/978-3-319-19210-9_5","article-title":"A Review of Security Protocols in mHeth Wireless Body Area Networks (WBAN)","author":"kang","year":"2015","journal-title":"International Conference on Future Network Systems and Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2674-1_42"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.jnca.2014.07.026","article-title":"eHealth: Survey on research projects, comparative study of telemonitoring architectures and main issues","volume":"46","author":"hamdi","year":"2014","journal-title":"Journal of Network and Computer Applications"},{"key":"ref9","article-title":"SEKEBAN (Secure and Efficient Key Exchange for wireless Body Area Network)","volume":"12","author":"mana","year":"2009","journal-title":"International Journal of Advanced Science and Technology"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.009"},{"key":"ref20","first-page":"114","article-title":"A public-key cryptosystem based on algebraic","volume":"4244","author":"mceliece","year":"1978","journal-title":"Coding Thv"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2013.12.05"},{"key":"ref21","article-title":"Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices","author":"heyse","year":"2013","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems"},{"journal-title":"Cryptographic Random Numbers Standard P1363 Appendix E","year":"1995","key":"ref24"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"5958","DOI":"10.3390\/s130505958","article-title":"Current trends in wireless mesh sensor networks: A review of competing approaches","volume":"13 5","author":"rodenas-herraiz","year":"2013","journal-title":"SENSORS"},{"year":"2015","key":"ref26"},{"key":"ref25","first-page":"28","article-title":"A fuzzy Commitment Scheme","author":"juels","year":"1999","journal-title":"Computer Communications of the ACM"}],"event":{"name":"2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2018,6,25]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410977\/8450266\/08450294.pdf?arnumber=8450294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T14:50:47Z","timestamp":1643208647000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8450294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2018.8450294","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}