{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T01:54:00Z","timestamp":1769910840419,"version":"3.49.0"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Technol. Biomed."],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.1109\/titb.2009.2037617","type":"journal-article","created":{"date-parts":[[2009,12,11]],"date-time":"2009-12-11T17:59:20Z","timestamp":1260554360000},"page":"60-68","source":"Crossref","is-referenced-by-count":256,"title":["PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks"],"prefix":"10.1109","volume":"14","author":[{"given":"Krishna K.","family":"Venkatasubramanian","sequence":"first","affiliation":[{"name":"IMPACT Laboratory, Arizona State University, Tempe, USA"}]},{"given":"Ayan","family":"Banerjee","sequence":"additional","affiliation":[{"name":"IMPACT Laboratory, Arizona State University, Tempe, USA"}]},{"given":"Sandeep Kumar S.","family":"Gupta","sequence":"additional","affiliation":[{"name":"IMPACT Laboratory, Arizona State University, Tempe, USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/11527923_32","article-title":"fuzzy vault for fingerprints","author":"uludag","year":"2005","journal-title":"Proc Audio- Video-Based Biometric Person Authentication"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632652"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060304"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.BODYNETS2009.6031"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2008\/529879","article-title":"biometric methods for secure communications in body sensor networks: resource-efficient key management and signal-level data scrambling","author":"bui","year":"2008","journal-title":"Proc EURASIP J Adv Signal Process"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2008.112"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1218556.1218559"},{"key":"ref3","author":"adelstein","year":"2005","journal-title":"Fundamentals of Mobile and Pervasive Computing"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1777406.1777410"},{"key":"ref5","first-page":"406","article-title":"ayushman: a wireless sensor network based health monitoring infrastructure and testbed","author":"venkatasubramanian","year":"2005","journal-title":"Proc IEEE Int Conf Distrib Comput Syst"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/ISIT.2002.1023680","article-title":"a fuzzy vault scheme","author":"juels","year":"2002","journal-title":"Proc IEEE Int Symp Inf Theory"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1142\/6175","author":"west","year":"2006","journal-title":"Where Medicine Went Wrong Rediscovering the Path to Complexity 11"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753199"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381692"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.4544608"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430534"},{"key":"ref22","author":"mihailescu","year":"2007"},{"key":"ref21","first-page":"1","article-title":"realization of correlation attack against the fuzzy vault scheme","volume":"6819","author":"kholmatov","year":"2008","journal-title":"Proc SPIE Security Forensics Steganography and Watermarking of Multimedia Contents X"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2009.47"}],"container-title":["IEEE Transactions on Information Technology in Biomedicine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4233\/5382610\/05352222.pdf?arnumber=5352222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T18:59:15Z","timestamp":1733252355000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5352222\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1]]},"references-count":23,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/titb.2009.2037617","relation":{},"ISSN":["1089-7771","1558-0032"],"issn-type":[{"value":"1089-7771","type":"print"},{"value":"1558-0032","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1]]}}}