{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T21:56:50Z","timestamp":1765231010338},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Biomed. Health Inform."],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/jbhi.2014.2366125","type":"journal-article","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T18:42:24Z","timestamp":1414780944000},"page":"135-142","source":"Crossref","is-referenced-by-count":37,"title":["Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography"],"prefix":"10.1109","volume":"20","author":[{"given":"Ruslan","family":"Dautov","sequence":"first","affiliation":[]},{"given":"Gill R.","family":"Tsouri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/TIFS.2010.2052253","article-title":"Automatic secret keys from reciprocal mimo wireless channels: measurement and analysis","volume":"5","author":"wallace","year":"2010","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/TIFS.2010.2043187","article-title":"Information-theoretically secret key generation for fading wireless channels","volume":"5","author":"ye","year":"2010","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.226"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921678"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2013.6504108"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1161\/01.CIR.101.23.e215"},{"key":"ref16","first-page":"1469","article-title":"Entropy inference and the James-Stein estimator, with application to nonlinear gene association networks","volume":"10","author":"hausser","year":"2009","journal-title":"J Mach Learn Res"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1088\/0967-3334\/26\/5\/R01"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2093698.2093851"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jelectrocard.2008.02.010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.862083"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.885507"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797641"},{"key":"ref7","article-title":"Perfect secrecy using compressed sensing","volume":"abs 1011 3985","author":"mayiami","year":"2010","journal-title":"CoRR"},{"key":"ref2","author":"daemen","year":"2002","journal-title":"The Design of Rijndael AES&#x2014;The Advanced Encryption Standard"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2011.6089562"},{"key":"ref1","year":"1996"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2006.256990"},{"key":"ref22","year":"2013"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970104"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2009.2039170"},{"key":"ref23","year":"2008","journal-title":"Natl Inst Stand Technol (US) Spec Publ"},{"key":"ref25","year":"0"}],"container-title":["IEEE Journal of Biomedical and Health Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221020\/7369993\/6942186.pdf?arnumber=6942186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:28:17Z","timestamp":1642004897000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6942186\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":25,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jbhi.2014.2366125","relation":{},"ISSN":["2168-2194","2168-2208"],"issn-type":[{"value":"2168-2194","type":"print"},{"value":"2168-2208","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1]]}}}