메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Block cipher based security for severely resource-constrained implantable medical devices

Author keywords

[No Author keywords available]

Indexed keywords

BIOMEDICAL APPLICATIONS; BLOCK CIPHERS; DUTY CYCLES; HIGHLY SENSITIVE; IMPLANTABLE MEDICAL DEVICES; IMPLANTED DEVICE; MEMORY CONSTRAINTS; RESOURCE CONSTRAINT; RESOURCE-CONSTRAINED; ROLE-BASED; SECURITY AND PRIVACY; SECURITY PROTOCOLS; SENSITIVE INFORMATIONS; WIRELESS CONNECTIVITIES; WIRELESS INTERFACES;

EID: 84856709903     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2093698.2093760     Document Type: Conference Paper
Times cited : (16)

References (25)
  • 3
    • 77956326865 scopus 로고    scopus 로고
    • 50th anniversary of the first successful permanent pacemaker implantation in the united states: Historical review and future directions
    • H. Beck, W. E. Boden, S. Patibandla, D. Kireyev, V. Gupta, F. Campagna, M. E. Cain, and J. E. Marine. 50th anniversary of the first successful permanent pacemaker implantation in the united states: Historical review and future directions. The American Journal of Cardiology, 106(6):810-818, 2010.
    • (2010) The American Journal of Cardiology , vol.106 , Issue.6 , pp. 810-818
    • Beck, H.1    Boden, W.E.2    Patibandla, S.3    Kireyev, D.4    Gupta, V.5    Campagna, F.6    Cain, M.E.7    Marine, J.E.8
  • 4
    • 84958258384 scopus 로고    scopus 로고
    • Artificial Accommodation System - A new approach to restore the accommodative ability of the human eye
    • R. Magjarevic, R. Magjarevic, and J. H. Nagel, editors, World Congress on Medical Physics and Biomedical Engineering 2006, Springer Berlin Heidelberg
    • M. Bergemann, U. Gengenbach, G. Bretthauer, and R. F. Guthoff. Artificial Accommodation System - a new approach to restore the accommodative ability of the human eye. In R. Magjarevic, R. Magjarevic, and J. H. Nagel, editors, World Congress on Medical Physics and Biomedical Engineering 2006, volume 14 of IFMBE Proceedings, pages 267-270. Springer Berlin Heidelberg, 2007.
    • (2007) IFMBE Proceedings , vol.14 , pp. 267-270
    • Bergemann, M.1    Gengenbach, U.2    Bretthauer, G.3    Guthoff, R.F.4
  • 5
    • 84856720489 scopus 로고    scopus 로고
    • The Artificial Accommodation SystemU{combining double acute accent}-a mechatronic implant for restoration of accommodation
    • G. Bretthauer, U. Gengenbach, and R. Guthoff. The Artificial Accommodation SystemU{combining double acute accent}-a mechatronic implant for restoration of accommodation. In BMT 2010, Rostock/Warnemünde, Oct. 2010.
    • BMT 2010, Rostock/Warnemünde, Oct. 2010
    • Bretthauer, G.1    Gengenbach, U.2    Guthoff, R.3
  • 10
    • 79952604291 scopus 로고    scopus 로고
    • Hardware implementation of symmetric algorithms for RFID security
    • Springer US
    • M. Feldhofer and J. Wolkerstorfer. Hardware implementation of symmetric algorithms for RFID security. In RFID Security, pages 373-415. Springer US, 2009.
    • (2009) RFID Security , pp. 373-415
    • Feldhofer, M.1    Wolkerstorfer, J.2
  • 13
    • 79956325553 scopus 로고    scopus 로고
    • Analysis of hardware encryption versus software encryption on wireless sensor network motes
    • Springer Berlin Heidelberg
    • M. Healy, T. Newe, and E. Lewis. Analysis of hardware encryption versus software encryption on wireless sensor network motes. In Smart Sensors and Sensing Technology, pages 3-14. Springer Berlin Heidelberg, 2008.
    • (2008) Smart Sensors and Sensing Technology , pp. 3-14
    • Healy, M.1    Newe, T.2    Lewis, E.3
  • 15
    • 33745269795 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • DOI 10.1145/1138127.1138130
    • Y. W. Law, J. Doumen, and P. Hartel. Survey and benchmark of block ciphers for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(1):65-93, Feb 2006. (Pubitemid 43925113)
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.1 , pp. 65-93
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3
  • 16
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • A. K. Lenstra and E. R. Verheul. Selecting cryptographic key sizes. Journal of Cryptology, 14(4):255-293, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 18
    • 84856720491 scopus 로고    scopus 로고
    • AES based biometrics security solution for body area sensor networks
    • April
    • F. Miao, L. Jiang, Y. Li, and Y. Zhang. AES based biometrics security solution for body area sensor networks. Bulletin of Advanced Technology Research, 3(4):37-41, April 2009.
    • (2009) Bulletin of Advanced Technology Research , vol.3 , Issue.4 , pp. 37-41
    • Miao, F.1    Jiang, L.2    Li, Y.3    Zhang, Y.4
  • 20
    • 0031696792 scopus 로고    scopus 로고
    • Cramming more components onto integrated circuits
    • Jan
    • G. Moore. Cramming more components onto integrated circuits. Proceedings of the IEEE, 86(1):82-85, Jan 1998.
    • (1998) Proceedings of the IEEE , vol.86 , Issue.1 , pp. 82-85
    • Moore, G.1
  • 23
  • 25
    • 85092032703 scopus 로고    scopus 로고
    • Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices
    • S. Schechter. Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices. In 1st USENIX Workshop on Health Security and Privacy (HealthSec '10), 2010.
    • 1st USENIX Workshop on Health Security and Privacy (HealthSec '10), 2010
    • Schechter, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.