{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:13Z","timestamp":1750307173710,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,26]],"date-time":"2011-10-26T00:00:00Z","timestamp":1319587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16SV3940"],"award-info":[{"award-number":["16SV3940"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,26]]},"DOI":"10.1145\/2093698.2093760","type":"proceedings-article","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T17:20:41Z","timestamp":1326820841000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Block cipher based security for severely resource-constrained implantable medical devices"],"prefix":"10.1145","author":[{"given":"Christoph","family":"Beck","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"given":"Daniel","family":"Masny","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"given":"Willi","family":"Geiselmann","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"given":"Georg","family":"Bretthauer","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]}],"member":"320","published-online":{"date-parts":[[2011,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2011.6139903"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISABEL.2010.5702901"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amjcard.2010.04.043"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"M.\n       \n      Bergemann U.\n       \n      Gengenbach G.\n       \n      Bretthauer and \n      \n      \n      R. F.\n       \n      Guthoff\n      \n  \n  . \n  Artificial Accommodation System -- a new approach to restore the accommodative ability of the human eye. In R. Magjarevic R. Magjarevic and J. H. Nagel editors World Congress on Medical Physics and Biomedical Engineering\n   \n  2006 volume \n  14\n   of \n  IFMBE Proceedings pages \n  267\n  --\n  270\n  . \n  Springer Berlin Heidelberg 2007.  M. Bergemann U. Gengenbach G. Bretthauer and R. F. Guthoff. Artificial Accommodation System -- a new approach to restore the accommodative ability of the human eye. In R. Magjarevic R. Magjarevic and J. H. Nagel editors World Congress on Medical Physics and Biomedical Engineering 2006 volume 14 of IFMBE Proceedings pages 267--270. Springer Berlin Heidelberg 2007.","DOI":"10.1007\/978-3-540-36841-0_75"},{"volume-title":"BMT 2010","year":"2010","author":"Bretthauer G.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1390576.1390581"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISABEL.2008.4712577"},{"key":"e_1_3_2_1_10_1","first-page":"373","volume-title":"RFID Security","author":"Feldhofer M.","year":"2009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018438"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79590-2_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMICT.2011.5759785"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138127.1138130"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0009-4"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2008.4577681"},{"issue":"4","key":"e_1_3_2_1_18_1","first-page":"37","article-title":"AES based biometrics security solution for body area sensor networks","volume":"3","author":"Miao F.","year":"2009","journal-title":"Bulletin of Advanced Technology Research"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2008.4650530"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.1998.658762"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2039711"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2011.6090800"},{"volume-title":"ISABEL","year":"2010","author":"Nagel J.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"National and N. I. S. T. Technology. Announcing the Advanced Encryption Standard (AES) 2001.  National and N. I. S. T. Technology. Announcing the Advanced Encryption Standard (AES) 2001."},{"volume-title":"1st USENIX Workshop on Health Security and Privacy (HealthSec '10)","year":"2010","author":"Schechter S.","key":"e_1_3_2_1_25_1"}],"event":{"name":"ISABEL '11: International Symposium on Applied Sciences in Biomedical and Communication Technologies","sponsor":["Universitat Pompeu Fabra","IEEE","Technical University of Catalonia Spain Technical University of Catalonia (UPC), Spain","River Publishers River Publishers","CTTC Technological Center for Telecommunications of Catalonia","CTIF Kyranova Ltd, Center for TeleInFrastruktur"],"location":"Barcelona Spain","acronym":"ISABEL '11"},"container-title":["Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2093698.2093760","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2093698.2093760","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:49Z","timestamp":1750240489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2093698.2093760"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,26]]},"references-count":24,"alternative-id":["10.1145\/2093698.2093760","10.1145\/2093698"],"URL":"https:\/\/doi.org\/10.1145\/2093698.2093760","relation":{},"subject":[],"published":{"date-parts":[[2011,10,26]]},"assertion":[{"value":"2011-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}