-
1
-
-
14844283547
-
PhysioBank, PhysioToolkit, and PhysioNet: Components of a new research resource for complex physiologic signals
-
A. L. Goldberger et al. PhysioBank, PhysioToolkit, and PhysioNet: Components of a new research resource for complex physiologic signals. Circulation, 101(23), 2000.
-
(2000)
Circulation
, vol.101
, Issue.23
-
-
Goldberger, A.L.1
-
3
-
-
56649112965
-
Using the timing information of heartbeats as an entity identifier to secure body sensor network
-
S. D. Bao, C. C. Y. Poon, Y. T. Zhang, and L. F. Shen. Using the timing information of heartbeats as an entity identifier to secure body sensor network. IEEE Trans. on Info. Tech. in Biomedicine, 12(6):772-779, 2008.
-
(2008)
IEEE Trans. on Info. Tech. in Biomedicine
, vol.12
, Issue.6
, pp. 772-779
-
-
Bao, S.D.1
Poon, C.C.Y.2
Zhang, Y.T.3
Shen, L.F.4
-
4
-
-
79960704749
-
Transitions: Recommendation for transitioning the use of cryptographic algorithms and key lengths
-
E. Barker and A. Roginsky. Transitions: Recommendation for transitioning the use of cryptographic algorithms and key lengths. NIST Special Publication, 800:131A, 2011.
-
(2011)
NIST Special Publication
, vol.800
-
-
Barker, E.1
Roginsky, A.2
-
5
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Eurocrypt, pages 139-155, 2000.
-
(2000)
Eurocrypt
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
84948352370
-
Nutzung der ekg-signaldatenbank cardiodat der ptb über das internet
-
R. Bousseljot, D. Kreiseler, and A. Schnabel. Nutzung der ekg-signaldatenbank cardiodat der ptb über das internet. Biomedizinische Technik Biomedical Engineering, 40(s1):317-318, 2009.
-
(2009)
Biomedizinische Technik Biomedical Engineering
, vol.40
, Issue.S1
, pp. 317-318
-
-
Bousseljot, R.1
Kreiseler, D.2
Schnabel, A.3
-
8
-
-
0037971427
-
Universally composible commitments
-
R. Canetti and M. Fischlin. Universally composible commitments. In Crypto, pages 332-349, 2001.
-
(2001)
Crypto
, pp. 332-349
-
-
Canetti, R.1
Fischlin, M.2
-
9
-
-
84939435969
-
Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In Parallel Processing Workshop, pages 432-439, 2003.
-
(2003)
Parallel Processing Workshop
, pp. 432-439
-
-
Cherukuri, S.1
Venkatasubramanian, K.K.2
Gupta, S.K.S.3
-
10
-
-
84863288241
-
Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks
-
K. Cho and D. Lee. Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks. In Information Security Applications, pages 203-218, 2012.
-
(2012)
Information Security Applications
, pp. 203-218
-
-
Cho, K.1
Lee, D.2
-
11
-
-
84868335627
-
Distance hijacking attacks on distance bounding protocols
-
C. Cremers, K. B. Rasmussen, B. Schmidt, and S. Capkun. Distance hijacking attacks on distance bounding protocols. In IEEE Symp. on Security and Privacy, pages 113-127, 2012.
-
(2012)
IEEE Symp. on Security and Privacy
, pp. 113-127
-
-
Cremers, C.1
Rasmussen, K.B.2
Schmidt, B.3
Capkun, S.4
-
13
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
T. Denning, K. Fu, and T. Kohno. Absence makes the heart grow fonder: New directions for implantable medical device security. In USENIX HotSec, 2008.
-
(2008)
USENIX HotSec
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
14
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. on Computing, 38(1):97-139, 2008.
-
(2008)
SIAM J. on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
16
-
-
67449084060
-
Inside risks: Reducing risks of implantable medical devices
-
June
-
K. Fu. Inside risks: Reducing risks of implantable medical devices. Communications of the ACM, 52(6):25-27, June 2009.
-
(2009)
Communications of the ACM
, vol.52
, Issue.6
, pp. 25-27
-
-
Fu, K.1
-
18
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: non-invasive security for implantable medical devices. In ACM SIGCOMM, pages 2-13, 2011.
-
(2011)
ACM SIGCOMM
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
19
-
-
80052087661
-
16-year trends in the infection burden for pacemakers and implantable cardioverter-defibrillators in the united states: 1993 to 2008
-
A. J. Greenspon, J. D. Patel, E. Lau, J. A. Ochoa, D. R. Frisch, R. T. Ho, B. B. Pavri, and S. M. Kurtz. 16-year trends in the infection burden for pacemakers and implantable cardioverter-defibrillators in the united states: 1993 to 2008. Journal of the American College of Cardiology, 58(10):1001-1006, 2011.
-
(2011)
Journal of the American College of Cardiology
, vol.58
, Issue.10
, pp. 1001-1006
-
-
Greenspon, A.J.1
Patel, J.D.2
Lau, E.3
Ochoa, J.A.4
Frisch, D.R.5
Ho, R.T.6
Pavri, B.B.7
Kurtz, S.M.8
-
20
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symp. on Security and Privacy, pages 129-142, 2008.
-
(2008)
IEEE Symp. on Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
21
-
-
38349178199
-
Security and privacy for implantable medical devices
-
Jan.-Mar.
-
D. Halperin, T. Kohno, T.S. Heydt-Benjamin, K. Fu, and W.H. Maisel. Security and privacy for implantable medical devices. IEEE Pervasive Computing, 7(1):30-39, Jan.-Mar. 2008.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.1
, pp. 30-39
-
-
Halperin, D.1
Kohno, T.2
Heydt-Benjamin, T.S.3
Fu, K.4
Maisel, W.H.5
-
23
-
-
84879861042
-
OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks
-
C. Hu, X. Cheng, F. Zhangand, D. Wuand, X. Liao, and D. Chen. OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In IEEE INFOCOM, 2013.
-
(2013)
IEEE INFOCOM
-
-
Hu, C.1
Cheng, X.2
Zhangand, F.3
Wuand, D.4
Liao, X.5
Chen, D.6
-
24
-
-
0033281339
-
A fuzzy commitment scheme
-
A. Juels and M. Wattenberg. A fuzzy commitment scheme. In ACM CCS, pages 28-36, 1999.
-
(1999)
ACM CCS
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
25
-
-
84889000179
-
A survey on the development of security mechanisms for body area networks
-
D. Karaouglan and A. Levi. A survey on the development of security mechanisms for body area networks. The Computer Journal, 2013.
-
(2013)
The Computer Journal
-
-
Karaouglan, D.1
Levi, A.2
-
29
-
-
23944466429
-
Safety issues involving medical devices
-
Aug.
-
W. H. Maisel. Safety issues involving medical devices. Journal of the American Medical Association, 294(8):955-958, Aug. 2005.
-
(2005)
Journal of the American Medical Association
, vol.294
, Issue.8
, pp. 955-958
-
-
Maisel, W.H.1
|