{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T05:07:57Z","timestamp":1773292077587,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176310","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"287-298","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Securing Wireless Neurostimulators"],"prefix":"10.1145","author":[{"given":"Eduard","family":"Marin","sequence":"first","affiliation":[{"name":"imec-COSIC, KU Leuven, Heverlee - Leuven, Belgium"}]},{"given":"Dave","family":"Singel\u00e9e","sequence":"additional","affiliation":[{"name":"imec-COSIC, KU Leuven, Heverlee - Leuven, Belgium"}]},{"given":"Bohan","family":"Yang","sequence":"additional","affiliation":[{"name":"imec-COSIC, KU Leuven, Heverlee - Leuven, Belgium"}]},{"given":"Vladimir","family":"Volski","sequence":"additional","affiliation":[{"name":"ESAT-TELEMIC, KU Leuven, Heverlee - Leuven, Belgium"}]},{"given":"Guy A. E.","family":"Vandenbosch","sequence":"additional","affiliation":[{"name":"ESAT-TELEMIC, KU Leuven, Heverlee - Leuven, Belgium"}]},{"given":"Bart","family":"Nuttin","sequence":"additional","affiliation":[{"name":"Neurosurgery, UZ Leuven, Heverlee - Leuven, Belgium"}]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[{"name":"imec-COSIC, KU Leuven, Heverlee - Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.painmed.org\/patientcenter\/facts_on_pain.aspx. {Online","author":"American Academy of Pain Medicine.","year":"2017","unstructured":"American Academy of Pain Medicine. http:\/\/www.painmed.org\/patientcenter\/facts_on_pain.aspx. {Online ; accessed 5- June - 2017 }. American Academy of Pain Medicine. http:\/\/www.painmed.org\/patientcenter\/facts_on_pain.aspx. {Online; accessed 5-June-2017}."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/competitions.cr.yp.to\/caesar.html. {Online","author":"ESAR","year":"2017","unstructured":"CA ESAR competition. https:\/\/competitions.cr.yp.to\/caesar.html. {Online ; accessed 5- June - 2017 }. CAESAR competition. https:\/\/competitions.cr.yp.to\/caesar.html. {Online; accessed 5-June-2017}."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/www.ni.com\/en-us\/support\/model.usb-6351.html. {Online","author":"DAQ","year":"2017","unstructured":"DAQ NI USB-6351. http:\/\/www.ni.com\/en-us\/support\/model.usb-6351.html. {Online ; accessed 5- June - 2017 }. DAQ NI USB-6351. http:\/\/www.ni.com\/en-us\/support\/model.usb-6351.html. {Online; accessed 5-June-2017}."},{"key":"e_1_3_2_1_4_1","volume-title":"http:\/\/www.atmel.com\/images\/doc4279.pdf. {Online","author":"Improvement Guidelines EMC","year":"2017","unstructured":"EMC Improvement Guidelines . http:\/\/www.atmel.com\/images\/doc4279.pdf. {Online ; accessed 5- June - 2017 }. EMC Improvement Guidelines. http:\/\/www.atmel.com\/images\/doc4279.pdf. {Online; accessed 5-June-2017}."},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/www.fcc.gov\/encyclopedia\/fcc-search-tools. {Online","author":"Federal Communications Commission (FCC) ID.","year":"2017","unstructured":"Federal Communications Commission (FCC) ID. http:\/\/www.fcc.gov\/encyclopedia\/fcc-search-tools. {Online ; accessed 5- June - 2017 }. Federal Communications Commission (FCC) ID. http:\/\/www.fcc.gov\/encyclopedia\/fcc-search-tools. {Online; accessed 5-June-2017}."},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/www.parkinsonassociation.org\/facts-about-parkinsons-disease\/. {Online","year":"2017","unstructured":"Parkinson association. http:\/\/www.parkinsonassociation.org\/facts-about-parkinsons-disease\/. {Online ; accessed 5- June - 2017 }. Parkinson association. http:\/\/www.parkinsonassociation.org\/facts-about-parkinsons-disease\/. {Online; accessed 5-June-2017}."},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/www.multichannelsystems.com\/products\/wireless-systems. {Online","year":"2017","unstructured":"W16 wireless recording device. http:\/\/www.multichannelsystems.com\/products\/wireless-systems. {Online ; accessed 5- June - 2017 }. W16 wireless recording device. http:\/\/www.multichannelsystems.com\/products\/wireless-systems. {Online; accessed 5-June-2017}."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/www.medgadget.com\/2014\/06\/mits-wifi-system-detects-peoples-breathing-heart-rate-even-through-walls.html. {Online","year":"2017","unstructured":"WiFi system detects peoples breathing heart rate even through walls. https:\/\/www.medgadget.com\/2014\/06\/mits-wifi-system-detects-peoples-breathing-heart-rate-even-through-walls.html. {Online ; accessed 5- June - 2017 }. WiFi system detects peoples breathing heart rate even through walls. https:\/\/www.medgadget.com\/2014\/06\/mits-wifi-system-detects-peoples-breathing-heart-rate-even-through-walls.html. {Online; accessed 5-June-2017}."},{"key":"e_1_3_2_1_9_1","volume-title":"Understanding PKI: Concepts, Standards, and Deployment Considerations","author":"Adams C.","year":"2002","unstructured":"C. Adams and S. Lloyd . Understanding PKI: Concepts, Standards, and Deployment Considerations . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 2 nd edition, 2002 . C. Adams and S. Lloyd. Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2nd edition, 2002.","edition":"2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939934"},{"key":"e_1_3_2_1_11_1","volume-title":"Antenna Theory: Analysis and Design","author":"Balanis C. A.","year":"2005","unstructured":"C. A. Balanis . Antenna Theory: Analysis and Design . Wiley-Interscience , 2005 . C. A. Balanis. Antenna Theory: Analysis and Design. Wiley-Interscience, 2005."},{"key":"e_1_3_2_1_12_1","volume-title":"Recommendation for the entropy sources used for random bitgeneration. NIST DRAFT Special Publication 800--90B","author":"Barker E.","year":"2016","unstructured":"E. Barker and J. Kelsey . Recommendation for the entropy sources used for random bitgeneration. NIST DRAFT Special Publication 800--90B , 2016 . E. Barker and J. Kelsey. Recommendation for the entropy sources used for random bitgeneration. NIST DRAFT Special Publication 800--90B, 2016."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24018-3_3"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/HEALTH.2011.6026732"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3171\/2009.4.FOCUS0985"},{"key":"e_1_3_2_1_16_1","unstructured":"C. F. Capacitor tuning circuits for inductive loads. PPG-1401 1992.  C. F. Capacitor tuning circuits for inductive loads. PPG-1401 1992."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018438"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866319"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.16"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5685228"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCET.2010.5485568"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744928"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009382.1009730"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991094"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857746"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362827"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3791\/1204"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2010.2086456"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653712"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488750"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516658"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.40"},{"key":"e_1_3_2_1_36_1","article-title":"Attacks on heartbeat-based security using remote photoplethysmography","author":"Seepers R. M.","year":"2017","unstructured":"R. M. Seepers , W. Wang , G. de Haan , I. Sourdis , and C. Strydis . Attacks on heartbeat-based security using remote photoplethysmography . IEEE Journal of Biomedical and Health Informatics, PP(99):1--1 , 2017 . R. M. Seepers, W. Wang, G. de Haan, I. Sourdis, and C. Strydis. Attacks on heartbeat-based security using remote photoplethysmography. IEEE Journal of Biomedical and Health Informatics, PP(99):1--1, 2017.","journal-title":"IEEE Journal of Biomedical and Health Informatics, PP(99):1--1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998414"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/647217.760118"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.21"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_3_2_1_41_1","first-page":"1862","volume-title":"30th Int. Conf. on Computer Communications, 10-15 April","author":"Xu F.","year":"2011","unstructured":"F. Xu , Z. Qin , C. C. Tan , B. Wang , and Q. Li . IMDGuard: Securing implantable medical devices with the external wearable guardian. In 2011 . 30th Int. Conf. on Computer Communications, 10-15 April , pages 1862 -- 1870 , 2011 . F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li. IMDGuard: Securing implantable medical devices with the external wearable guardian. In 2011. 30th Int. Conf. on Computer Communications, 10-15 April, pages 1862--1870, 2011."}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","location":"Tempe AZ USA","acronym":"CODASPY '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176310","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":40,"alternative-id":["10.1145\/3176258.3176310","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176310","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}