{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:31:02Z","timestamp":1761611462215},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/percomw.2018.8480248","type":"proceedings-article","created":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T19:49:51Z","timestamp":1539028191000},"page":"421-423","source":"Crossref","is-referenced-by-count":2,"title":["Demo of BANDANA - Body Area Network Device-to-device Authentication using Natural gAit"],"prefix":"10.1109","author":[{"given":"Ngu","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"caglar YUce","family":"Kaya","sequence":"additional","affiliation":[]},{"given":"Arne","family":"BrUsch","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"SchUrmann","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Sigg","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"SAPHE: simple accelerometer based wireless pairing with heuristic trees","author":"mayrhofer","year":"2012","journal-title":"Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73275-4_1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.06.028"},{"key":"ref6","first-page":"190","article-title":"BANDANA &#x2013; Body Area Network Device-to-device Authentication using Natural gAit","author":"schurmann","year":"2017","journal-title":"IEEE PERCOM"},{"key":"ref5","article-title":"Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication","author":"xu","year":"2016","journal-title":"2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICORR.2011.5975346"},{"key":"ref7","article-title":"Secure key generation using gait features for body sensor networks","author":"sun","year":"2017","journal-title":"IEEE BSN"},{"key":"ref2","article-title":"Smudge attacks on smartphone touch screens","author":"aviv","year":"2010","journal-title":"Proceedings of the 4th USENIX Conference on Offensive Technologies"},{"key":"ref9","first-page":"1","article-title":"On-body Localization of Wearable Devices: An Investigation of Position-Aware Activity Recognition","author":"sztyler","year":"2016","journal-title":"IEEE International Conference on Pervasive Computing and Communications (PerCom&#x2019;16)"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1109\/JPROC.2003.819611","article-title":"Comparing passwords, tokens, and biometrics for user authentication","author":"o\u2019gorman","year":"2003","journal-title":"Proceedings of the IEEE"}],"event":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","start":{"date-parts":[[2018,3,19]]},"location":"Athens","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8454955\/8480085\/08480248.pdf?arnumber=8480248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T06:35:04Z","timestamp":1540881304000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8480248\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/percomw.2018.8480248","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}