{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T13:45:35Z","timestamp":1773668735895,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1145\/2968456.2973748","type":"proceedings-article","created":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T19:25:51Z","timestamp":1476386751000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Evolving authentication design considerations for the internet of biometric things (IoBT)"],"prefix":"10.1145","author":[{"given":"Nima","family":"Karimian","sequence":"first","affiliation":[{"name":"University of Connecticut"}]},{"given":"Paul A.","family":"Wortman","sequence":"additional","affiliation":[{"name":"University of Connecticut"}]},{"given":"Fatemeh","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"University of Connecticut"}]}],"member":"320","published-online":{"date-parts":[[2016,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The design of teaching management system in universities based on biometrics identification and the internet of things technology.  The design of teaching management system in universities based on biometrics identification and the internet of things technology."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/www.physionet.org\/pn3\/ecgiddb\/biometric.shtml","author":"ECG","year":"2016","unstructured":"ECG uniquness. http:\/\/www.physionet.org\/pn3\/ecgiddb\/biometric.shtml , 2016 . ECG uniquness. http:\/\/www.physionet.org\/pn3\/ecgiddb\/biometric.shtml, 2016."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-008-0073-4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2011.28"},{"issue":"3","key":"e_1_3_2_1_5_1","first-page":"808","article-title":"Ecg analysis: a new approach in human identification. Instrumentation and Measurement","volume":"50","author":"Biel L.","year":"2001","unstructured":"L. Biel , O. Pettersson , L. Philipson , and P. Wide . Ecg analysis: a new approach in human identification. Instrumentation and Measurement , IEEE Transactions on , 50 ( 3 ): 808 -- 812 , 2001 . L. Biel, O. Pettersson, L. Philipson, and P. Wide. Ecg analysis: a new approach in human identification. Instrumentation and Measurement, IEEE Transactions on, 50(3):808--812, 2001.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_6_1","unstructured":"J. Brodkin. Comcast security flaw could help burglars break into homes undetected. http:\/\/arstechnica.com\/security\/2016\/01\/comcast-security\/ 2016.  J. Brodkin. Comcast security flaw could help burglars break into homes undetected. http:\/\/arstechnica.com\/security\/2016\/01\/comcast-security\/ 2016."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2015.7335286"},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/biometrics.idealtest.org","year":"2016","unstructured":"Casia. Irisv1. http:\/\/biometrics.idealtest.org , 2016 . Casia. Irisv1. http:\/\/biometrics.idealtest.org, 2016."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.01.016"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"key":"e_1_3_2_1_12_1","first-page":"184","volume-title":"Electronics in Marine, 2004. Proceedings Elmar 2004. 46th International Symposium","author":"Delac K.","year":"2004","unstructured":"K. Delac and M. Grgic . A survey of biometric recognition methods . In Electronics in Marine, 2004. Proceedings Elmar 2004. 46th International Symposium , pages 184 -- 193 . IEEE, 2004 . K. Delac and M. Grgic. A survey of biometric recognition methods. In Electronics in Marine, 2004. Proceedings Elmar 2004. 46th International Symposium, pages 184--193. IEEE, 2004."},{"key":"e_1_3_2_1_13_1","volume-title":"Talking to strangers: Authentication in ad-hoc wireless networks","author":"Dirk Balfanz P. S.","year":"2002","unstructured":"P. S. Dirk Balfanz , D. K. Smetters and H. C. Wong . Talking to strangers: Authentication in ad-hoc wireless networks , 2002 , Book . P. S. Dirk Balfanz, D. K. Smetters and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks, 2002, Book."},{"key":"e_1_3_2_1_14_1","volume-title":"IoT security in the spotlight at PrivacyCon. https:\/\/nakedsecurity.sophos.com\/2016\/01\/22\/iot-security-in-the-spotlight-at-privacycon\/","author":"Ducklin P.","year":"2016","unstructured":"P. Ducklin . IoT security in the spotlight at PrivacyCon. https:\/\/nakedsecurity.sophos.com\/2016\/01\/22\/iot-security-in-the-spotlight-at-privacycon\/ , 2016 . P. Ducklin. IoT security in the spotlight at PrivacyCon. https:\/\/nakedsecurity.sophos.com\/2016\/01\/22\/iot-security-in-the-spotlight-at-privacycon\/, 2016."},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/www.fitbit.com\/","author":"Website Fitbit","year":"2016","unstructured":"Fitbit. Fitbit Website . https:\/\/www.fitbit.com\/ , 2016 . Fitbit. Fitbit Website. https:\/\/www.fitbit.com\/, 2016."},{"key":"e_1_3_2_1_16_1","volume-title":"e. a. Goldberger. Physiobank, physiotoolkit, and physionet components of a new research resource for complex physiologic signals. 101(23):e215--e220","author":"A.","year":"2000","unstructured":"A. L. e. a. Goldberger. Physiobank, physiotoolkit, and physionet components of a new research resource for complex physiologic signals. 101(23):e215--e220 , 2000 . A. L. e. a. Goldberger. Physiobank, physiotoolkit, and physionet components of a new research resource for complex physiologic signals. 101(23):e215--e220, 2000."},{"key":"e_1_3_2_1_17_1","unstructured":"D. Goodin. Why Algebraic Eraser may be the riskiest cryptosystem you've never heard of. http:\/\/arstechnica.com\/security\/2015\/11\/why-algebraiceraser-maybe-the-most-risky-cryptosystem\/ 2015.  D. Goodin. Why Algebraic Eraser may be the riskiest cryptosystem you've never heard of. http:\/\/arstechnica.com\/security\/2015\/11\/why-algebraiceraser-maybe-the-most-risky-cryptosystem\/ 2015."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2016.7527491"},{"key":"e_1_3_2_1_19_1","volume-title":"nymi - white paper","author":"N. Inc.","year":"2015","unstructured":"N. Inc. nymi - white paper . 2015 . N. Inc. nymi - white paper. 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_1_21_1","volume-title":"Highly reliable key generation from electrocardiogram (ecg)","author":"Karimian N.","year":"2016","unstructured":"N. Karimian , Z. Guo , M. Tehranipoor , and D. Forte . Highly reliable key generation from electrocardiogram (ecg) . 2016 . N. Karimian, Z. Guo, M. Tehranipoor, and D. Forte. Highly reliable key generation from electrocardiogram (ecg). 2016."},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"Internet Research","author":"Li S.","year":"2015","unstructured":"S. Li and T. Tryfonas . The internet of things: a security point of view . Internet Research , pages 1 -- 34 , 2015 . S. Li and T. Tryfonas. The internet of things: a security point of view. Internet Research, pages 1--34, 2015."},{"key":"e_1_3_2_1_23_1","volume-title":"Gartner's hype cycle special report for","author":"L\u00c3ijtkebohle I.","year":"2011","unstructured":"I. L\u00c3ijtkebohle . Gartner's hype cycle special report for 2011 . http:\/\/www.gartner.com\/technology\/research\/hype-cycles, 2011. I. L\u00c3ijtkebohle. Gartner's hype cycle special report for 2011. http:\/\/www.gartner.com\/technology\/research\/hype-cycles, 2011."},{"key":"e_1_3_2_1_24_1","volume-title":"Can smart tech make firearms safer?","author":"Monks K.","year":"2014","unstructured":"K. Monks . The guns that know who is firing them : Can smart tech make firearms safer? , 2014 . K. Monks. The guns that know who is firing them: Can smart tech make firearms safer?, 2014."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2012.21001"},{"key":"e_1_3_2_1_26_1","volume-title":"https:\/\/www.nymi.com","author":"Website Nymi","year":"2016","unstructured":"Nymi. Nymi Website . https:\/\/www.nymi.com , 2016 . Nymi. Nymi Website. https:\/\/www.nymi.com, 2016."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2215324"},{"key":"e_1_3_2_1_28_1","volume-title":"Feb. 17","author":"Osten D. W.","year":"1998","unstructured":"D. W. Osten , H. M. Carim , M. R. Arneson , and B. L. Blan . Biometric, personal authentication system , Feb. 17 1998 . US Patent 5,719,950. D. W. Osten, H. M. Carim, M. R. Arneson, and B. L. Blan. Biometric, personal authentication system, Feb. 17 1998. US Patent 5,719,950."},{"key":"e_1_3_2_1_29_1","article-title":"A real-time qrs detection algorithm. Biomedical Engineering","author":"Pan J.","year":"1985","unstructured":"J. Pan and W. J. Tompkins . A real-time qrs detection algorithm. Biomedical Engineering , IEEE Transactions on, (3):230--236 , 1985 . J. Pan and W. J. Tompkins. A real-time qrs detection algorithm. Biomedical Engineering, IEEE Transactions on, (3):230--236, 1985.","journal-title":"IEEE Transactions on, (3):230--236"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2013.78"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.15252\/embr.201541677"},{"key":"e_1_3_2_1_32_1","volume-title":"DTIC Document","author":"Rukhin A.","year":"2001","unstructured":"A. Rukhin , J. Soto , J. Nechvatal , M. Smid , and E. Barker . A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report , DTIC Document , 2001 . A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, DTIC Document, 2001."},{"key":"e_1_3_2_1_33_1","volume-title":"https:\/\/sen.se\/mother\/","author":"Website Mother","year":"2016","unstructured":"Sense. Mother Website . https:\/\/sen.se\/mother\/ , 2016 . Sense. Mother Website. https:\/\/sen.se\/mother\/, 2016."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_17"},{"key":"e_1_3_2_1_35_1","volume-title":"Avinashilingam","author":"Sujithra M.","year":"2016","unstructured":"M. Sujithra and G. Padmavathi . Iot security challenges and issues---an overview . Avinashilingam , 2016 . M. Sujithra and G. Padmavathi. Iot security challenges and issues---an overview. Avinashilingam, 2016."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742060.2742069"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495561"},{"key":"e_1_3_2_1_38_1","volume-title":"IoT doorbell have up Wi-Fi passwords to anybody with a screwdriver. https:\/\/nakedsecurity.sophos.com\/2016\/01\/27\/iot-doorbell-gave-up-wi-fi-passwords-to-anybody-with\\-a-screwdriver\/","author":"Vaas L.","year":"2016","unstructured":"L. Vaas . IoT doorbell have up Wi-Fi passwords to anybody with a screwdriver. https:\/\/nakedsecurity.sophos.com\/2016\/01\/27\/iot-doorbell-gave-up-wi-fi-passwords-to-anybody-with\\-a-screwdriver\/ , 2016 . L. Vaas. IoT doorbell have up Wi-Fi passwords to anybody with a screwdriver. https:\/\/nakedsecurity.sophos.com\/2016\/01\/27\/iot-doorbell-gave-up-wi-fi-passwords-to-anybody-with\\-a-screwdriver\/, 2016."},{"key":"e_1_3_2_1_39_1","volume-title":"says top spook James Clapper. https:\/\/nakedsecurity.sophos.com\/2016\/02\/11\/we-might-use-your-iot-stuff-to-spy-on-you-says-top-spook\\-james-clapper","author":"Vaas L.","year":"2016","unstructured":"L. Vaas . We might use your IoT stuff to spy on you , says top spook James Clapper. https:\/\/nakedsecurity.sophos.com\/2016\/02\/11\/we-might-use-your-iot-stuff-to-spy-on-you-says-top-spook\\-james-clapper , 2016 . L. Vaas. We might use your IoT stuff to spy on you, says top spook James Clapper. https:\/\/nakedsecurity.sophos.com\/2016\/02\/11\/we-might-use-your-iot-stuff-to-spy-on-you-says-top-spook\\-james-clapper, 2016."},{"key":"e_1_3_2_1_40_1","volume-title":"Wearfit: Security design analysis of a wearable fitness tracker. Technical report","author":"West J.","year":"2016","unstructured":"J. West , T. Kohno , D. Lindsay , and J. Sechman . Wearfit: Security design analysis of a wearable fitness tracker. Technical report , IEEE Center for Secure Design , February 2016 . J. West, T. Kohno, D. Lindsay, and J. Sechman. Wearfit: Security design analysis of a wearable fitness tracker. Technical report, IEEE Center for Secure Design, February 2016."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2840819.2840838"},{"key":"e_1_3_2_1_42_1","volume-title":"https:\/\/www.helpnetsecurity.com\/2015\/10\/13\/wifi-jamming-attacks-more-simple-and-cheaper-than-ever\/","author":"Zorz Z.","year":"2015","unstructured":"Z. Zorz . WiFi jamming attacks more simple and cheaper than ever. https:\/\/www.helpnetsecurity.com\/2015\/10\/13\/wifi-jamming-attacks-more-simple-and-cheaper-than-ever\/ , 2015 . Z. Zorz. WiFi jamming attacks more simple and cheaper than ever. https:\/\/www.helpnetsecurity.com\/2015\/10\/13\/wifi-jamming-attacks-more-simple-and-cheaper-than-ever\/, 2015."}],"event":{"name":"ESWEEK'16: TWELFTH EMBEDDED SYSTEM WEEK","location":"Pittsburgh Pennsylvania","acronym":"ESWEEK'16"},"container-title":["Proceedings of the Eleventh IEEE\/ACM\/IFIP International Conference on Hardware\/Software Codesign and System Synthesis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2968456.2973748","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2968456.2973748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:10Z","timestamp":1750218010000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2968456.2973748"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":42,"alternative-id":["10.1145\/2968456.2973748","10.1145\/2968456"],"URL":"https:\/\/doi.org\/10.1145\/2968456.2973748","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]},"assertion":[{"value":"2016-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}