메뉴 건너뛰기




Volumn , Issue , 2012, Pages 942-948

Securing wireless medical devices

Author keywords

authentication; efficiency; key distribution; medical devices; onetime pad; security

Indexed keywords

BIOMEDICAL EQUIPMENT; COMPUTING POWER; CRYPTOGRAPHY; GREEN COMPUTING; MANUFACTURE; NETWORK SECURITY;

EID: 84877655360     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2012.6503234     Document Type: Conference Paper
Times cited : (4)

References (31)
  • 1
    • 40649108378 scopus 로고    scopus 로고
    • Wireless communication systems for implantable medical devices.
    • D. Panescu, "Wireless communication systems for implantable medical devices.," IEEE Engineering in Medicine and Biology Magazine, vol. 27, no. 2, pp. 96-101, 2009.
    • (2009) IEEE Engineering in Medicine and Biology Magazine , vol.27 , Issue.2 , pp. 96-101
    • Panescu, D.1
  • 3
    • 50249098733 scopus 로고    scopus 로고
    • Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
    • D. Halperin et al., "Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses," 2008 IEEE Symposium on Security and Privacy sp 2008, vol. ISSU, no. PAGE, pp. 129-142, 2008.
    • (2008) 2008 IEEE Symposium on Security and Privacy Sp 2008 , pp. 129-142
    • Halperin, D.1
  • 10
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • F. Hao, R. Anderson, and J. Daugman, "Combining Crypto with Biometrics Effectively," IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081-1088, 2006.
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 11
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
    • C. C. Y. Poon, Y. T. Zhang, and S. D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, 2006.
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.C.Y.1    Zhang, Y.T.2    Bao, S.D.3
  • 14
    • 77953972283 scopus 로고    scopus 로고
    • Absence makes the heart grow fonder : New directions for implantable medical device security
    • July 2008
    • T. Denning, K. Fu, and T. Kohno, "Absence Makes the Heart Grow Fonder : New Directions for Implantable Medical Device Security," in USENIX Workshop on Hot Topics in Security (HotSec), July 2008, 2008.
    • (2008) USENIX Workshop on Hot Topics in Security (HotSec)
    • Denning, T.1    Fu, K.2    Kohno, T.3
  • 15
    • 84858840753 scopus 로고    scopus 로고
    • The eSTREAM Project
    • "The eSTREAM Project," ECRYPT Network of Excellence, 2008. [Online]. Available: http://www.ecrypt.eu.org/stream/.
    • (2008) ECRYPT Network of Excellence
  • 17
    • 33744929155 scopus 로고    scopus 로고
    • MCrypton - A lightweight block cipher for security of low-cost RFID tags and sensors
    • C. H. Lim and T. Korkishko, "mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors," Workshop on Information Security Applications WISA05, pp. 243-258, 2005.
    • (2005) Workshop on Information Security Applications WISA05 , pp. 243-258
    • Lim, C.H.1    Korkishko, T.2
  • 18
    • 33750699594 scopus 로고    scopus 로고
    • HIGHT: A new block cipher suitable for low-resource device
    • D. Hong et al., "HIGHT: A New Block Cipher Suitable for Low-Resource Device," in Cryptographic Hardware and Embedded Systems CHES 2006, 2006, vol. 4249, pp. 46-59.
    • (2006) Cryptographic Hardware and Embedded Systems CHES 2006 , vol.4249 , pp. 46-59
    • Hong, D.1
  • 19
    • 84887313979 scopus 로고    scopus 로고
    • Searching for compact algorithms: CGEN
    • P. Nguyen, Ed. Springer Berlin / Heidelberg
    • M. Robshaw, "Searching for Compact Algorithms: CGEN," in Progress in Cryptology - VIETCRYPT 2006, vol. 4341, P. Nguyen, Ed. Springer Berlin / Heidelberg, 2006, pp. 37-49.
    • (2006) Progress in Cryptology - VIETCRYPT 2006 , vol.4341 , pp. 37-49
    • Robshaw, M.1
  • 21
    • 0007700727 scopus 로고
    • The Intel random number generator
    • July
    • B. Jun and P. Kocher, "The Intel random number generator," Cryptography Research Inc white paper, vol. 27, no. July 1948, pp. 1-8, 1999.
    • (1948) Cryptography Research Inc White Paper , vol.27 , Issue.1999 , pp. 1-8
    • Jun, B.1    Kocher, P.2
  • 24
    • 0005314429 scopus 로고    scopus 로고
    • The state of cryptographic hash functions
    • B. Preneel, "The State of Cryptographic Hash Functions," Lecture Notes in Computer Science, vol. 1561, pp. 158-182, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1561 , pp. 158-182
    • Preneel, B.1
  • 25
    • 0030234930 scopus 로고    scopus 로고
    • Combined multiple recursive random number generators
    • P. L. Ecuyer, "COMBINED MULTIPLE RECURSIVE RANDOM NUMBER GENERATORS," Operations Research, vol. 44, no. 5, pp. 816-822, 2012.
    • (2012) Operations Research , vol.44 , Issue.5 , pp. 816-822
    • Ecuyer, P.L.1
  • 26
    • 33747285760 scopus 로고
    • A new method for known plaintext attack of FEAL cipher
    • M. Matsui and A. Yamagishi, "A new method for known plaintext attack of FEAL cipher," in Advances in Cryptology EuroCrypt 92, 1992, vol. 658, pp. 81-91.
    • (1992) Advances in Cryptology EuroCrypt 92 , vol.658 , pp. 81-91
    • Matsui, M.1    Yamagishi, A.2
  • 30
    • 0017501281 scopus 로고
    • Special feature exhaustive cryptanalysis of the nbs data encryption standard
    • Jun.
    • W. Diffie and M. E. Hellman, "Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard," Computer, vol. 10, no. 6, pp. 74-84, Jun. 1977.
    • (1977) Computer , vol.10 , Issue.6 , pp. 74-84
    • Diffie, W.1    Hellman, M.E.2
  • 31
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," in Advances in Cryptology-CRYPTO'96, 1996, vol. 1109, no. 1109, pp. 104-113.
    • (1996) Advances in Cryptology-CRYPTO'96 , vol.1109 , Issue.1109 , pp. 104-113
    • Kocher, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.