{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:29:13Z","timestamp":1752985753932,"version":"3.37.3"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"UK EPSRC","award":["EP\/N023242\/1"],"award-info":[{"award-number":["EP\/N023242\/1"]}]},{"name":"PETRAS Research Hub - Cyersecurity"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2021,3,1]]},"DOI":"10.1109\/tdsc.2019.2921773","type":"journal-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T20:16:05Z","timestamp":1559938565000},"page":"875-888","source":"Crossref","is-referenced-by-count":13,"title":["Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical Devices"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6253-1822","authenticated-orcid":false,"given":"Hassan","family":"Chizari","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2844-3917","authenticated-orcid":false,"given":"Emil","family":"Lupu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2556315.2556324"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-22"},{"key":"ref33","first-page":"92","article-title":"Towards using physiological signals as cryptographic keys in body area networks","author":"altop","year":"2015","journal-title":"Proc 9th Int Conf Pervasive Comput Technol Healthcare"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1049\/iet-ifs.2012.0104","article-title":"Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security","volume":"7","author":"bao","year":"2013","journal-title":"IET Inf Secur"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5772\/51856"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BMEI.2012.6513198"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2015.7343648"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2015.7381316"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567031"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27890-7_17"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21551-3"},{"article-title":"IPI values of heart beats","year":"2018","author":"chizari","key":"ref61"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2013.6750259"},{"key":"ref27","first-page":"1519","article-title":"An improved scheme of IPI-based entity identifier generation for securing body sensor networks","author":"hong","year":"2011","journal-title":"Proc 33rd Annu Int Conf IEEE Eng Med Biol Soc"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIAR.2015.7358543"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2359517"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5603\/KP.a2017.0019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13365-7_29"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2014.7011935"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753199"},{"key":"ref24","first-page":"998","article-title":"A biometric-based security for data authentication in Wireless Body Area Network (WBAN)","author":"ramli","year":"2013","journal-title":"Proc Int Conf Adv Commun Technol"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/s16040570"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2010.5671940"},{"key":"ref25","first-page":"217","article-title":"Unconditional security in cryptography","author":"wolf","year":"2003","journal-title":"Information Security Applications"},{"journal-title":"Cryptography A Primer","year":"1981","author":"konheim","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/malq.200310121"},{"key":"ref59","first-page":"70","article-title":"Random number generation is too important to be left to chance","volume":"3","author":"coveyou","year":"1969","journal-title":"Appl Probability Monte Carlo Methods Modern Aspects Dyn Stud Appl Math"},{"journal-title":"Random Number Generation and Quasi-Monte Carlo Methods","year":"2012","author":"niederreiter","key":"ref58"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2012.6380912"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1777406.1777410"},{"key":"ref55","article-title":"Empirical test of the martingale property in stock market: Evidence from Nigeria","volume":"5","author":"ayodele","year":"2017","journal-title":"Accounting &amp; Finance"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.2168\/LMCS-10(4:12)2014"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1002\/malq.201200089"},{"key":"ref52","first-page":"1","article-title":"Deterministic randomness extraction from generalized and distributed Santha-Vazirani sources","volume":"179","author":"beigi","year":"2014","journal-title":"Electron Colloq Comput Complexity"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.04.007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1009"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.05.014"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1097\/PRS.0000000000002623"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00784-013-1099-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2016.2553152"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/2013RS005319"},{"article-title":"Understanding pacemaker systems cybersecurity","year":"2017","author":"rios","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632652"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1777406.1777410"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.06.001"},{"year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1093\/europace\/euu012"},{"key":"ref6","first-page":"2893","article-title":"Design and implementation of a volume conduction based RFID system for smart implants","author":"liu","year":"2011","journal-title":"Proc 33rd Annu Int Conf IEEE Eng Med Biol Soc"},{"article-title":"An inventor has fitted himself with a implant which replaces car keys and he says the future is HERE","year":"2017","author":"hamill","key":"ref5"},{"article-title":"J&J warns diabetic patients: Insulin pump vulnerable to hacking","year":"2016","author":"finkle","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.wneu.2016.05.010"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(86)90044-9"},{"article-title":"Hacking risk leads to recall of 500,000 pacemakers due to patient death fears","year":"2017","author":"hern","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2015.0007"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1994.394764"},{"article-title":"Entropy measures and unconditional security in cryptography","year":"1997","author":"cachin","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1161\/01.CIR.101.23.e215"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2013.03.005"},{"journal-title":"Dieharder A Random Number Test Suite","year":"2013","author":"brown","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9372344\/08733047.pdf?arnumber=8733047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:05:31Z","timestamp":1642003531000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8733047\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,1]]},"references-count":61,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2019.2921773","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2021,3,1]]}}}