{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T06:33:06Z","timestamp":1768977186239,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T00:00:00Z","timestamp":1555372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,16]]},"DOI":"10.1145\/3302506.3310406","type":"proceedings-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T18:38:43Z","timestamp":1554403123000},"page":"265-276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":61,"title":["H2B"],"prefix":"10.1145","author":[{"given":"Qi","family":"Lin","sequence":"first","affiliation":[{"name":"University of New South Wales and Data61 CSIRO"}]},{"given":"Weitao","family":"Xu","sequence":"additional","affiliation":[{"name":"University of New South Wales"}]},{"given":"Jun","family":"Liu","sequence":"additional","affiliation":[{"name":"University of New South Wales"}]},{"given":"Abdelwahed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of New South Wales and Data61 CSIRO"}]},{"given":"Wen","family":"Hu","sequence":"additional","affiliation":[{"name":"University of New South Wales and Data61 CSIRO"}]},{"given":"Mahbub","family":"Hassan","sequence":"additional","affiliation":[{"name":"University of New South Wales and Data61 CSIRO"}]},{"given":"Aruna","family":"Seneviratne","sequence":"additional","affiliation":[{"name":"University of New South Wales and Data61 CSIRO"}]}],"member":"320","published-online":{"date-parts":[[2019,4,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AMPY. 2018. http:\/\/www.getampy.com\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.440"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2008.926434"},{"key":"e_1_3_2_1_4_1","volume-title":"Compressive sensing","author":"Baraniuk Richard G","year":"2007","unstructured":"Richard G Baraniuk. 2007. Compressive sensing. IEEE signal processing magazine 24, 4 (2007), 118--121."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706031"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sna.2012.10.021"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0735-1097(01)01108-1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.929958"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-013-9574-7"},{"key":"e_1_3_2_1_11_1","first-page":"4","article-title":"IEEE Standard for Local and Metropolitan Area Networks?Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)","volume":"802","author":"IEEE 802 Working Group et al.","year":"2011","unstructured":"IEEE 802 Working Group et al. 2011. IEEE Standard for Local and Metropolitan Area Networks?Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs). IEEE Std 802 (2011), 4--2011.","journal-title":"IEEE Std"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Le Guan Jun Xu Shuai Wang Xinyu Xing Lin Lin Heqing Huang Peng Liu and Wenke Lee. 2016. From physical to cyber: Escalating protection for personalized auto insurance. In Sensys. ACM 42--55. 10.1145\/2994551.2994573","DOI":"10.1145\/2994551.2994573"},{"key":"e_1_3_2_1_13_1","volume-title":"Using Eulerian video magnification framework to measure pulse transit time","author":"He Xiaochuan","unstructured":"Xiaochuan He, Rafik A Goubran, and Xiaoping P Liu. 2014. Using Eulerian video magnification framework to measure pulse transit time. In MeMeA. IEEE, 1--4."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobihealth.2014.257440"},{"key":"e_1_3_2_1_15_1","volume-title":"OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks","author":"Hu Chunqiang","year":"2013","unstructured":"Chunqiang Hu, Xiuzhen Cheng, Fan Zhang, Dengyuan Wu, Xiaofeng Liao, and Dechang Chen. 2013. OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In INFOCOM. IEEE, 2274--2282."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03904-1_78"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626319"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2761744"},{"key":"e_1_3_2_1_19_1","unstructured":"KINERGIZER. 2018. http:\/\/kinergizer.com\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"He Liu Stefan Saroiu Alec Wolman and Himanshu Raj. 2012. Software abstractions for trusted sensors. In Mobisys. ACM 365--378. 10.1145\/2307636.2307670","DOI":"10.1145\/2307636.2307670"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486015"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Suhas Mathur Robert Miller Alexander Varshavsky Wade Trappe and Narayan Mandayam. 2011. Proximate: proximity-based secure pairing using ambient wireless signals. In Mobisys. ACM 211--224. 10.1145\/1999995.2000016","DOI":"10.1145\/1999995.2000016"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.51"},{"key":"e_1_3_2_1_24_1","volume-title":"Cardiovascular psychophysiology: A perspective","author":"Obrist Paul A","unstructured":"Paul A Obrist. 2012. Cardiovascular psychophysiology: A perspective. Springer Science & Business Media."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18061691"},{"key":"e_1_3_2_1_26_1","first-page":"13","article-title":"Qrs detection and heart rate variability analysis: a survey","volume":"2","author":"Oweis Rami J","year":"2014","unstructured":"Rami J Oweis and Basim O Al-Tabbaa. 2014. Qrs detection and heart rate variability analysis: a survey. Biomed Sci Eng 2, 1 (2014), 13--34.","journal-title":"Biomed Sci Eng"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632652"},{"key":"e_1_3_2_1_28_1","volume-title":"Heart rate variability analysis using a seismocardiogram signal","author":"Ramos-Castro J","unstructured":"J Ramos-Castro, J Moreno, H Miranda-Vidal, MA Garcia-Gonzalez, Mireya Fern\u00e1ndez-Chimeno, G Rodas, and Ll Capdevila. 2012. Heart rate variability analysis using a seismocardiogram signal. In EMBC. IEEE, 5642--5645."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/962758.963491"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516658"},{"key":"e_1_3_2_1_32_1","volume-title":"PerCom","author":"Sch\u00fcrmann Dominik","unstructured":"Dominik Sch\u00fcrmann, Arne Br\u00fcsch, Stephan Sigg, and Lars Wolf. 2017. BANDANA?Body area network device-to-device authentication using natural gAit. In PerCom. IEEE, 190--196."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2731979"},{"key":"e_1_3_2_1_34_1","unstructured":"SOLEPOWER. 2018. http:\/\/www.solepowertech.com\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7378439"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264950"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2046199"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1088\/0964-1726\/20\/4\/045009"},{"key":"e_1_3_2_1_39_1","unstructured":"Hao-Yu Wu Michael Rubinstein Eugene Shih John Guttag Fr\u00e9do Durand and William Freeman. 2012. Eulerian video magnification for revealing subtle changes in the world. (2012)."},{"key":"e_1_3_2_1_40_1","volume-title":"IMDGuard: Securing implantable medical devices with the external wearable guardian","author":"Xu Fengyuan","year":"1862","unstructured":"Fengyuan Xu, Zhengrui Qin, Chiu C Tan, Baosheng Wang, and Qun Li. 2011. IMDGuard: Securing implantable medical devices with the external wearable guardian. In INFOCOM. IEEE, 1862--1870."},{"key":"e_1_3_2_1_41_1","unstructured":"Weitao Xu Guohao Lan Qi Lin Sara Khalifa Neil Bergmann Mahbub Hassan and Wen Hu. 2017. KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting. In NDSS."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2959355.2959358"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","unstructured":"Wenyuan Xu Wade Trappe Yanyong Zhang and Timothy Wood. 2005. The feasibility of launching and detecting jamming attacks in wireless networks. In Mobihoc. ACM 46--57. 10.1145\/1062689.1062697","DOI":"10.1145\/1062689.1062697"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","unstructured":"Lin Yang Wei Wang and Qian Zhang. 2016. Secret from Muscle: Enabling Secure Pairing with Electromyography.. In SenSys. 28--41. 10.1145\/2994551.2994556","DOI":"10.1145\/2994551.2994556"},{"key":"e_1_3_2_1_45_1","volume-title":"Securing wireless medical implants using an ECG-based secret data sharing scheme","author":"Zheng Guanglou","unstructured":"Guanglou Zheng, Gengfa Fang, Mehmet A Orgun, Rajan Shankaran, and Eryk Dutkiewicz. 2014. Securing wireless medical implants using an ECG-based secret data sharing scheme. In ISCIT. IEEE, 373--377."}],"event":{"name":"IPSN '19: The 18th International Conference on Information Processing in Sensor Networks","location":"Montreal Quebec Canada","acronym":"IPSN '19","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","IEEE-SPS Signal Processing Society"]},"container-title":["Proceedings of the 18th International Conference on Information Processing in Sensor Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3302506.3310406","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3302506.3310406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:54Z","timestamp":1750204434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3302506.3310406"}},"subtitle":["heartbeat-based secret key generation using piezo vibration sensors"],"short-title":[],"issued":{"date-parts":[[2019,4,16]]},"references-count":44,"alternative-id":["10.1145\/3302506.3310406","10.1145\/3302506"],"URL":"https:\/\/doi.org\/10.1145\/3302506.3310406","relation":{},"subject":[],"published":{"date-parts":[[2019,4,16]]},"assertion":[{"value":"2019-04-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}