{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:25:43Z","timestamp":1761675943492,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T00:00:00Z","timestamp":1284076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,10]]},"DOI":"10.1145\/2221924.2221927","type":"proceedings-article","created":{"date-parts":[[2012,5,29]],"date-time":"2012-05-29T17:38:53Z","timestamp":1338313133000},"page":"8-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Secure handshake with symptoms-matching"],"prefix":"10.1145","author":[{"given":"Rongxing","family":"Lu","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, Canada"}]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Ontario Institute of Technology, Canada"}]},{"given":"Xiaohui","family":"Liang","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Canada"}]},{"given":"Xuemin (Sherman)","family":"Shen","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Canada"}]}],"member":"320","published-online":{"date-parts":[[2010,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655084.1655087"},{"key":"e_1_3_2_1_2_1","first-page":"180","volume-title":"Secret handshake from pairing-based key agreements","author":"Balfanz D.","year":"2003","unstructured":"Balfanz , D. , Durfee , G. , Shankar , N. , Smetters , D. , Staddon , J. , and Wong , H . Secret handshake from pairing-based key agreements . In IEEE S &P '93 ( 2003 ), pp. 180 -- 196 . Balfanz, D., Durfee, G., Shankar, N., Smetters, D., Staddon, J., and Wong, H. Secret handshake from pairing-based key agreements. In IEEE S&P '93 (2003), pp. 180--196."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1432967.1433003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655084.1655086"},{"volume-title":"AHIC 2010 (Kitchener","author":"Liang X.","key":"e_1_3_2_1_7_1","unstructured":"Liang , X. , Lu , R. , Lin , X. , and Shen , X . Patient self-controllable access policy on PHI in ehealthcare systems . In AHIC 2010 (Kitchener , Ontario, Canada). Liang, X., Lu, R., Lin, X., and Shen, X. Patient self-controllable access policy on PHI in ehealthcare systems. In AHIC 2010 (Kitchener, Ontario, Canada)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090502"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1719850.1719953"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0133-9"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.091228"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11689522_31"}],"event":{"name":"BodyNets '10: The Fifth International Conference on Body Area Networks","sponsor":["ICST","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Corfu Greece","acronym":"BodyNets '10"},"container-title":["Proceedings of the Fifth International Conference on Body Area Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2221924.2221927","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2221924.2221927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:00:47Z","timestamp":1750276847000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2221924.2221927"}},"subtitle":["the essential to the success of mhealthcare social network"],"short-title":[],"issued":{"date-parts":[[2010,9,10]]},"references-count":12,"alternative-id":["10.1145\/2221924.2221927","10.1145\/2221924"],"URL":"https:\/\/doi.org\/10.1145\/2221924.2221927","relation":{},"subject":[],"published":{"date-parts":[[2010,9,10]]},"assertion":[{"value":"2010-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}