-
1
-
-
84863537000
-
Design challenges for secure implantable medical devices
-
W. Burleson, S. S. Clark, B. Ransford, and K. Fu, "Design challenges for secure implantable medical devices, " in Proceedings of Design Automation Conference, pp. 12-17, 2012.
-
(2012)
Proceedings of Design Automation Conference
, pp. 12-17
-
-
Burleson, W.1
Clark, S.S.2
Ransford, B.3
Fu, K.4
-
2
-
-
23944466429
-
Safety issues involving medical devices
-
Aug.
-
W. Maisel, "Safety issues involving medical devices, " Journal of the American Medical Association, vol. 294, pp. 955-958, Aug. 2005.
-
(2005)
Journal of the American Medical Association
, vol.294
, pp. 955-958
-
-
Maisel, W.1
-
3
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. Maisel, "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses, " in IEEE Symp. on Security and Privacy (S& P), pp. 129-142, 2008.
-
(2008)
IEEE Symp. on Security and Privacy (S& P)
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.2
Ransford, B.3
Clark, S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.9
-
4
-
-
80053973692
-
Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
-
C. Li, A. Raghunathan, and N. K. Jha, "Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system, " in IEEE Int. Conf. on e-Health Networking Applications and Services, pp. 150-156, 2011.
-
(2011)
IEEE Int. Conf. on E-Health Networking Applications and Services
, pp. 150-156
-
-
Li, C.1
Raghunathan, A.2
Jha, N.K.3
-
5
-
-
38349178199
-
Security and privacy for implantable medical devices
-
Jan.-Mar.
-
D. Halperin, T. Kohno, T. Heydt-Benjamin, K. Fu, and W. Maisel, "Security and privacy for implantable medical devices, " IEEE Pervasive Computing, vol. 7, pp. 30-39, Jan.-Mar. 2008.
-
(2008)
IEEE Pervasive Computing
, vol.7
, pp. 30-39
-
-
Halperin, D.1
Kohno, T.2
Heydt-Benjamin, T.3
Fu, K.4
Maisel, W.5
-
6
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks, " in Int. Workshop of Security Protocols, pp. 172-194, 1999.
-
(1999)
Int. Workshop of Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
7
-
-
33846932093
-
Interoperability and security in wireless body area network infrastructures
-
S. Warren, J. Lebak, J. Yao, J. Creekmore, A. Milenkovic, and E. Jovanov, "Interoperability and security in wireless body area network infrastructures, " in IEEE Engineering in Medicine and Biology Society, pp. 3837-3840, 2005.
-
(2005)
IEEE Engineering in Medicine and Biology Society
, pp. 3837-3840
-
-
Warren, S.1
Lebak, J.2
Yao, J.3
Creekmore, J.4
Milenkovic, A.5
Jovanov, E.6
-
8
-
-
34047155030
-
Security and privacy issues with health care information technology
-
M. Meingast, T. Roosta, and S. Sastry, "Security and privacy issues with health care information technology, " in IEEE Engineering in Medicine and Biology Society, pp. 5453-5458, 2006.
-
(2006)
IEEE Engineering in Medicine and Biology Society
, pp. 5453-5458
-
-
Meingast, M.1
Roosta, T.2
Sastry, S.3
-
9
-
-
78249242072
-
Trustworthy data collection from implantable medical devices via high-speed security implementation based on ieee 1363
-
Nov.
-
F. Hu, Q. Hao, M. Lukowiak, Q. Sun, K. Wilhelm, S. Radziszowski, and Y. Wu, "Trustworthy data collection from implantable medical devices via high-speed security implementation based on IEEE 1363, " IEEE Trans. on Info. Tech. in Biomedicine, vol. 14, pp. 1397-1404, Nov. 2010.
-
(2010)
IEEE Trans. on Info. Tech. in Biomedicine
, vol.14
, pp. 1397-1404
-
-
Hu, F.1
Hao, Q.2
Lukowiak, M.3
Sun, Q.4
Wilhelm, K.5
Radziszowski, S.6
Wu, Y.7
-
10
-
-
84879873019
-
Diginotar files for bankruptcy in wake of devastating hack
-
20 Sept.
-
K. Zetter, "DigiNotar files for bankruptcy in wake of devastating hack, " Wired, 20 Sept. 2011.
-
(2011)
Wired
-
-
Zetter, K.1
-
11
-
-
79960873920
-
Imdguard: Securing implantable medical devices with the external wearable guardian
-
F. Xu, Z. Qin, C. Tan, B. Wang, and Q. Li, "IMDGuard: Securing implantable medical devices with the external wearable guardian, " in Proc. of IEEE INFOCOM, pp. 1862-1870, 2011.
-
(2011)
Proc. of IEEE INFOCOM
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.3
Wang, B.4
Li, Q.5
-
12
-
-
84879861042
-
Opfka: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks
-
To Appear
-
C. Hu, X. Cheng, F. Zhangand, D. Wuand, X. Liao, and D. Chen, "OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks, " in Proc. of IEEE INFOCOM, To Appear, 2013.
-
(2013)
Proc. of IEEE INFOCOM
-
-
Hu, C.1
Cheng, X.2
Zhangand, F.3
Wuand, D.4
Liao, X.5
Chen, D.6
-
13
-
-
0030380805
-
Personal area networks: Near-field intrabody communication
-
T. G. Zimmerman, "Personal area networks: near-field intrabody communication, " IBM systems Journal, vol. 35, pp. 609-617, 1996.
-
(1996)
IBM Systems Journal
, vol.35
, pp. 609-617
-
-
Zimmerman, T.G.1
-
14
-
-
0029193237
-
Applying electric field sensing to human-computer interfaces
-
T. G. Zimmerman, J. R. Smith, J. A. Paradiso, D. Allport, and N. Gershenfeld, "Applying electric field sensing to human-computer interfaces, " in Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 280-287, 1995.
-
(1995)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 280-287
-
-
Zimmerman, T.G.1
Smith, J.R.2
Paradiso, J.A.3
Allport, D.4
Gershenfeld, N.5
-
15
-
-
85092069836
-
Body area network security: Robust key establishment using human body channel
-
5
-
S.-Y. Chang, Y.-C. Hu, H. Anderson, T. Fu, and E. Y. Huang, "Body area network security: robust key establishment using human body channel, " in Proceedings of the USENIX conference on Health Security and Privacy, pp. 5-5, 2012.
-
(2012)
Proceedings of the USENIX Conference on Health Security and Privacy
, pp. 5
-
-
Chang, S.-Y.1
Hu, Y.-C.2
Anderson, H.3
Fu, T.4
Huang, E.Y.5
-
16
-
-
84939435969
-
Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
S. Cherukuri, K. Venkatasubramanian, and S. Gupta, "Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body, " in Parallel Processing Workshop, pp. 432-439, 2003.
-
(2003)
Parallel Processing Workshop
, pp. 432-439
-
-
Cherukuri, S.1
Venkatasubramanian, K.2
Gupta, S.3
-
17
-
-
0025067397
-
Chaos and fractals in human physiology
-
A. L. Goldberger, D. R. Rigney, and B. J. West, "Chaos and fractals in human physiology, " Scientific American, vol. 262, pp. 42-49, 1990.
-
(1990)
Scientific American
, vol.262
, pp. 42-49
-
-
Goldberger, A.L.1
Rigney, D.R.2
West, B.J.3
-
18
-
-
0035075949
-
Applying nonlinear noise reduction in the analysis of heart rate variability
-
IEEE
-
M. Signorini, F. Marchetti, and S. Cerutti, "Applying nonlinear noise reduction in the analysis of heart rate variability, " Engineering in Medicine and Biology Magazine, IEEE, vol. 20, no. 2, pp. 59-68, 2001.
-
(2001)
Engineering in Medicine and Biology Magazine
, vol.20
, Issue.2
, pp. 59-68
-
-
Signorini, M.1
Marchetti, F.2
Cerutti, S.3
-
19
-
-
41349097058
-
Quantification of heart rate variability by discrete nonstationary non-markov stochastic processes
-
R. Yulmetyev, P. Hänggi, and F. Gafarov, "Quantification of heart rate variability by discrete nonstationary non-Markov stochastic processes, " Physical Review E, vol. 65, no. 4, p. 046107, 2002.
-
(2002)
Physical Review E
, vol.65
, Issue.4
, pp. 046107
-
-
Yulmetyev, R.1
Hänggi, P.2
Gafarov, F.3
-
20
-
-
76849098534
-
Pska: Usable and secure key agreement scheme for body area networks
-
K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "PSKA: usable and secure key agreement scheme for body area networks, " IEEE Trans. on Information Technology in Biomedicine, vol. 14, no. 1, pp. 60-68, 2010.
-
(2010)
IEEE Trans. on Information Technology in Biomedicine
, vol.14
, Issue.1
, pp. 60-68
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.K.S.3
-
21
-
-
78650759211
-
Plethysmogram-based secure inter-sensor communication in body area networks
-
K. K. Venkatasubramanian, A. Banerjee, and S. Gupta, "Plethysmogram- based secure inter-sensor communication in body area networks, " in IEEE Military Communications Conference, pp. 1-7, 2008.
-
(2008)
IEEE Military Communications Conference
, pp. 1-7
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.3
-
22
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
-
C. Poon, Y. Zhang, and S. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health, " IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.1
Zhang, Y.2
Bao, S.3
-
23
-
-
56649112965
-
Using the timing information of heartbeats as an entity identifier to secure body sensor network
-
S. Bao, C. Poon, Y. Zhang, and L. Shen, "Using the timing information of heartbeats as an entity identifier to secure body sensor network, " IEEE Trans. on Info. Tech. in Biomedicine, vol. 12, no. 6, pp. 772-779, 2008.
-
(2008)
IEEE Trans. on Info. Tech. in Biomedicine
, vol.12
, Issue.6
, pp. 772-779
-
-
Bao, S.1
Poon, C.2
Zhang, Y.3
Shen, L.4
-
24
-
-
77954990804
-
Physiological value-based efficient usable security solutions for body sensor networks
-
31:1-31:36, July
-
K. Venkatasubramanian and S. Gupta, "Physiological value-based efficient usable security solutions for body sensor networks, " ACM Trans. Sensor Networks, vol. 6, pp. 31:1-31:36, July 2010.
-
(2010)
ACM Trans. Sensor Networks
, vol.6
-
-
Venkatasubramanian, K.1
Gupta, S.2
-
25
-
-
84863288241
-
Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks
-
K. Cho and D. Lee, "Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks, " in Information Security Applications, pp. 203-218, 2012.
-
(2012)
Information Security Applications
, pp. 203-218
-
-
Cho, K.1
Lee, D.2
-
26
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, " SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
27
-
-
30844458593
-
A fuzzy vault scheme
-
A. Juels and M. Sudan, "A fuzzy vault scheme, " Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237-257, 2006.
-
(2006)
Designs, Codes and Cryptography
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
28
-
-
84891050675
-
Body area network security: A fuzzy attribute-based signcryption scheme
-
To Appear
-
X. Liao, "Body area network security: A fuzzy attribute-based signcryption scheme, " IEEE Journal on Selected Areas in Communications, To Appear, 2013.
-
(2013)
IEEE Journal on Selected Areas in Communications
-
-
Liao, X.1
-
29
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
T. Denning, K. Fu, and T. Kohno, "Absence makes the heart grow fonder: New directions for implantable medical device security, " in USENIX HotSec, 2008.
-
(2008)
USENIX HotSec
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
30
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: non-invasive security for implantable medical devices, " in ACM SIGCOMM, pp. 2-13, 2011.
-
(2011)
ACM SIGCOMM
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
31
-
-
84881223293
-
Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time
-
W. Shen, P. Ning, X. He, and H. Dai, "Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time, " in IEEE Symp. on Security and Privacy, 2013.
-
(2013)
IEEE Symp. on Security and Privacy
-
-
Shen, W.1
Ning, P.2
He, X.3
Dai, H.4
-
32
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
K. Rasmussen, C. Castelluccia, T. Heydt-Benjamin, and S. Capkun, "Proximity-based access control for implantable medical devices, " in Proc. of Computer and communications security, pp. 410-419, 2009.
-
(2009)
Proc. of Computer and Communications Security
, pp. 410-419
-
-
Rasmussen, K.1
Castelluccia, C.2
Heydt-Benjamin, T.3
Capkun, S.4
-
33
-
-
84868335627
-
Distance hijacking attacks on distance bounding protocols
-
C. Cremers, K. Rasmussen, B. Schmidt, and S. Capkun, "Distance hijacking attacks on distance bounding protocols, " in IEEE Symp. on Security and Privacy, pp. 113-127, 2012.
-
(2012)
IEEE Symp. on Security and Privacy
, pp. 113-127
-
-
Cremers, C.1
Rasmussen, K.2
Schmidt, B.3
Capkun, S.4
-
34
-
-
79955480673
-
Distance bounding with ieee 802.15.4a: Attacks and countermeasures
-
M. Poturalski, M. Flury, P. Papadimitratos, J.-P. Hubaux, and J.-Y. L. Boudec, "Distance bounding with ieee 802.15.4a: Attacks and countermeasures, " IEEE Trans. on Wireless Comms., vol. 10, no. 4, pp. 1334- 1344, 2011.
-
(2011)
IEEE Trans. on Wireless Comms.
, vol.10
, Issue.4
, pp. 1334-1344
-
-
Poturalski, M.1
Flury, M.2
Papadimitratos, P.3
Hubaux, J.-P.4
Boudec, J.-Y.L.5
-
35
-
-
33845498091
-
-
Referenced 2012
-
distributed.net, "Project RC5." http://www.distributed.net/RC5, Referenced 2012.
-
Project RC5
-
-
-
36
-
-
67650671123
-
Key agreement from close secrets over unsecured channels
-
B. Kanukurthi and L. Reyzin, "Key agreement from close secrets over unsecured channels, " in Eurocrypt, pp. 206-223, 2009.
-
(2009)
Eurocrypt
, pp. 206-223
-
-
Kanukurthi, B.1
Reyzin, L.2
-
37
-
-
55449122987
-
Overview of candidate device technologies for storage-class memory
-
no. 4.5
-
G. Burr, B. Kurdi, J. Scott, C. Lam, K. Gopalakrishnan, and R. Shenoy, "Overview of candidate device technologies for storage-class memory, " IBM Journal of Research and Development, vol. 52, no. 4.5, pp. 449-464, 2008.
-
(2008)
IBM Journal of Research and Development
, vol.52
, pp. 449-464
-
-
Burr, G.1
Kurdi, B.2
Scott, J.3
Lam, C.4
Gopalakrishnan, K.5
Shenoy, R.6
-
39
-
-
17044365390
-
Energy scavenging for mobile and wireless electronics
-
J. Paradiso and T. Starner, "Energy scavenging for mobile and wireless electronics, " IEEE Pervasive Computing, vol. 4, no. 1, pp. 18-27, 2005.
-
(2005)
IEEE Pervasive Computing
, vol.4
, Issue.1
, pp. 18-27
-
-
Paradiso, J.1
Starner, T.2
|