-
1
-
-
57049172592
-
Security protocols, properties, and their monitoring
-
ACM, New York, NY
-
BAUER, A. AND JUERJENS, J. 2008. Security protocols, properties, and their monitoring. In Proceedings of the 4th International Workshop on Software Engineering for Secure Systems (SESS'08). ACM, New York, NY, 33-40.
-
(2008)
Proceedings of the 4th International Workshop on Software Engineering for Secure Systems (SESS'08)
, pp. 33-40
-
-
Bauer, A.1
Juerjens, J.2
-
2
-
-
84856709903
-
Block cipher based security for severely resource-constrained implantable medical devices
-
ACM
-
BECK, C., MASNY, D., GEISELMANN, W., AND BRETTHAUER, G. 2011. Block cipher based security for severely resource-constrained implantable medical devices. In Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies. ACM, 62.
-
(2011)
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
, pp. 62
-
-
Beck, C.1
Masny, D.2
Geiselmann, W.3
Bretthauer, G.4
-
3
-
-
84867161676
-
An analysis of security weaknesses in the evolution of RFID enabled passport
-
BOGARI, E. A., ZAVARSKY, P., LINDSKOG, D., AND RUHL, R. 2012. An analysis of security weaknesses in the evolution of RFID enabled passport. In Proceedings of the 2012 World Congress on Internet Security (WorldCIS'12). 158-166.
-
(2012)
Proceedings of the 2012 World Congress on Internet Security (WorldCIS'12)
, pp. 158-166
-
-
Bogari, E.A.1
Zavarsky, P.2
Lindskog, D.3
Ruhl, R.4
-
4
-
-
1442292337
-
Protocols for authentication and key establishment
-
3rd Ed Springer Publishing Company, Incorporated
-
BOYD, C. AND MATHURIA, A. 2010. Protocols for authentication and key establishment. In Information Security and Cryptography 3rd Ed. Springer Publishing Company, Incorporated.
-
(2010)
Information Security and Cryptography
-
-
Boyd, C.1
Mathuria, A.2
-
5
-
-
4143130875
-
Energy efficient security protocol for wireless sensor networks
-
IEEE
-
CAM, H.,OZDEMIR, S.,MUTHUAVINASHIAPPAN, D., AND NAIR, P. 2003. Energy efficient security protocol for wireless sensor networks. In Proceedings of the Vehicular Technology Conference. Vol. 5. IEEE, 2981-2984.
-
(2003)
Proceedings of the Vehicular Technology Conference
, vol.5
, pp. 2981-2984
-
-
Ozdemir, C.H.1
Muthuavinashiappan, D.S.2
Nair, P.3
-
6
-
-
84868335627
-
Distance hijacking attacks on distance bounding protocols
-
CREMERS, C., RASMUSSEN, K. B., SCHMIDT, B., AND CAPKUN, S. 2012. Distance hijacking attacks on distance bounding protocols. In Proceedings of the IEEE Symposium on Security and Privacy (SP'12). 113-127.
-
(2012)
Proceedings of the IEEE Symposium on Security and Privacy (SP'12)
, pp. 113-127
-
-
Cremers, C.1
Rasmussen, K.B.2
Schmidt, B.3
Capkun, S.4
-
7
-
-
0031808307
-
Acute effects on insulin sensitivity and diurnal metabolic profiles of a high-sucrose compared with a high-starch diet
-
DALY, M. E., VALE, C., WALKER, M., LITTLEFIELD, A., ALBERTI, K., AND MATHERS, J. C. 1998. Acute effects on insulin sensitivity and diurnal metabolic profiles of a high-sucrose compared with a high-starch diet. American Journal of Clinical Nutrition 67, 6, 1186-1196.
-
(1998)
American Journal of Clinical Nutrition
, vol.67
, Issue.6
, pp. 1186-1196
-
-
Daly, M.E.1
Vale, C.2
Walker, M.3
Littlefield, A.4
Alberti, K.5
Mathers, J.C.6
-
9
-
-
77954020097
-
Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices
-
DENNING, T., BORNING, A., FRIEDMAN, B., GILL, B. T., KOHNO, T., AND MAISEL, W. H. 2010. Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proceedings of the 28th International Conference on Human Factors in Computing Systems. 917-926.
-
(2010)
Proceedings of the 28th International Conference on Human Factors in Computing Systems
, pp. 917-926
-
-
Denning, T.1
Borning, A.2
Friedman, B.3
Gill, B.T.4
Kohno, T.5
Maisel, W.H.6
-
10
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
USENIX Association
-
DENNING, T.,FU, K., AND KOHNO, T. 2008. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proceedings of the 3rd Conference on Hot Topics in Security. USENIX Association, 5:1-5:7.
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security
, vol.5
, Issue.1-5
, pp. 7
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
12
-
-
85025381566
-
-
FCC. FCC 47CFR95.601-95.673 Subpart E/I. Rules for MedRadio Services
-
FCC. 2003. MICS Medical Implant Communication Services. FCC 47CFR95.601-95.673 Subpart E/I. Rules for MedRadio Services.
-
(2003)
MICS Medical Implant Communication Services
-
-
-
13
-
-
0026117424
-
A microprocessor-based implantable telemetry system
-
FERNALD, K., COOK, T., III, T. M., AND PAULOS, J. 1991. A microprocessor-based implantable telemetry system. IEEE Computer 24, 23-30.
-
(1991)
IEEE Computer
, vol.24
, pp. 23-30
-
-
Fernald, K.1
Cook, T.2
Paulos, J.3
-
15
-
-
84892454478
-
-
Retrieved December 2, 2013
-
GOLLAKOTA, S., HASSANIEH, H., RANSFORD, B., KATABI, D., AND FU, K. 2011. They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices. Retrieved December 2, 2013 from http://groups.csail.mit.edu/netmit/ IMDShield/paper.pdf.
-
(2011)
They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
17
-
-
38349178199
-
Security and privacy for implantable medical devices
-
HALPERIN, D., HEYDT-BENJAMIN, T. S., FU, K., KOHNO, T., AND MAISEL, W. H. 2008. Security and privacy for implantable medical devices. IEEE Pervasive Computing 7, 30-39.
-
(2008)
IEEE Pervasive Computing
, vol.7
, pp. 30-39
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Fu, K.3
Kohno, T.4
Maisel, W.H.5
-
18
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zeropower defenses
-
IEEE Computer Society
-
HALPERIN, D.,HEYDT-BENJAMIN, T. S., RANSFORD, B., CLARK, S. S.,DEFEND, B.,MORGAN, W., FU, K.,KOHNO, T., AND MAISEL,W. H. 2008. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zeropower defenses. In Proceedings of the 2008 IEEE Symposium on Security and Privacy. IEEE Computer Society, 129-142.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.S.3
Defend, C.S.B.4
Morgan, W.K.5
Kohno, T.F.U.6
Maiselw, H.7
-
20
-
-
79551649543
-
Defending resource depletion attacks on implantable medical devices
-
IEEE
-
HEI, X.,DU, X.,WU, J., AND HU, F. 2010. Defending resource depletion attacks on implantable medical devices. In GLOBECOM. IEEE, 1-5.
-
(2010)
GLOBECOM
, pp. 1-5
-
-
Hei, X.1
Du, X.2
Wu, J.3
Hu, F.4
-
23
-
-
84892459814
-
Design of an implantablemultichannel neurostimulator for restoring impaired gastrointestinal motility
-
JALILIAN, E.,TURNER, L., JULLIEN, G., ANDMITCHEV,M. 2004. Design of an implantablemultichannel neurostimulator for restoring impaired gastrointestinal motility. In Proceedings of the 9th Annual Conference of the International FES Society.
-
(2004)
Proceedings of the 9th Annual Conference of the International FES Society
-
-
Jalilian, E.1
Turner, L.2
Jullien, G.3
Mitchev, M.4
-
25
-
-
77958150562
-
Wireless sensor networks for healthcare
-
KO, J., LU, C., SRIVASTAVA, M. B., STANKOVIC, J. A., TERZIS, A., AND WELSH, M. 2010. Wireless sensor networks for healthcare. Proceedings of the IEEE 98, 11, 1947-1960.
-
(2010)
Proceedings of the IEEE
, vol.98
, Issue.11
, pp. 1947-1960
-
-
Ko, J.1
Lu, C.2
Srivastava, M.B.3
Stankovic, J.A.4
Terzis, A.5
Welsh, M.6
-
26
-
-
77956045650
-
Researchers fight to keep implanted medical devices safe from hackers
-
LEAVITT, N. 2010. Researchers Fight to Keep Implanted Medical Devices Safe from Hackers. Computer 43, 11-14.
-
(2010)
Computer
, vol.43
, pp. 11-14
-
-
Leavitt, N.1
-
27
-
-
78049298573
-
The price of security in wireless sensor networks
-
LEE, J., KAPITANOVA, K., AND SON, S. H. 2010. The price of security in wireless sensor networks. Computer Networks 54, 17, 2967-2978.
-
(2010)
Computer Networks
, vol.54
, Issue.17
, pp. 2967-2978
-
-
Lee, J.1
Kapitanova, K.2
Son, S.H.3
-
30
-
-
29144526751
-
A second-generation sensor network processor with application-driven memory optimizations and out-of-order execution
-
ACM
-
NAZHANDALI, L.,MINUTH, M., ZHAI, B., OLSON, J., AUSTIN, T., AND BLAAUW, D. 2005. A second-generation sensor network processor with application-driven memory optimizations and out-of-order execution. In Proceedings of the 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems. ACM, 249-256.
-
(2005)
Proceedings of the 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems
, pp. 249-256
-
-
Nazhandali, L.1
Minuth, M.2
Zhai, B.3
Olson, J.4
Austin, T.5
Blaauw, D.6
-
33
-
-
20344371167
-
A description of the misty1 encryption algorithm
-
November
-
OHTA, H. AND MATSUI, M. 2000. A description of the misty1 encryption algorithm. RFC2994, November.
-
(2000)
RFC2994
-
-
Ohta, H.1
Matsui, M.2
-
34
-
-
79961134633
-
Energy harvesting and remote powering for implantable biosensors
-
OLIVO, J., CARRARA, S., AND DE MICHELI, G. 2011. Energy harvesting and remote powering for implantable biosensors. IEEE Sensors Journal 11, 7, 1573-1586.
-
(2011)
IEEE Sensors Journal
, vol.11
, Issue.7
, pp. 1573-1586
-
-
Olivo, J.1
Carrara, S.2
De Micheli, G.3
-
35
-
-
84855654230
-
Vhdl implementation of the biostator ii glucose control algorithm for critical care
-
IEEE
-
PAGKALOS, I.,HERRERO, P., EL-SHARKAWY, M., PESL, P., OLIVER, N., AND GEORGIOU, P. 2011. Vhdl implementation of the biostator ii glucose control algorithm for critical care. In Proceedings of the Biomedical Circuits and Systems Conference (BioCAS'11). IEEE, 94-97.
-
(2011)
Proceedings of the Biomedical Circuits and Systems Conference (BioCAS'11)
, pp. 94-97
-
-
Pagkalos, I.1
Herrero, P.2
El-Sharkawy, M.3
Pesl, P.4
Oliver, N.5
Georgiou, P.6
-
36
-
-
1142275612
-
A low-cost memory architecture with nand xip for mobile embedded systems
-
ACM
-
PARK, C., SEO, J., BAE, S., KIM, H., KIM, S., AND KIM, B. 2003. A low-cost memory architecture with nand xip for mobile embedded systems. In Proceedings of the 1st IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis. ACM, 138-143.
-
(2003)
Proceedings of the 1st IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis
, pp. 138-143
-
-
Park, C.1
Seo, J.2
Bae, S.3
Kim, H.4
Kim, S.5
Kim, B.6
-
39
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
ACM
-
RASMUSSEN, K. B., CASTELLUCCIA, C., HEYDT-BENJAMIN, T. S., AND CAPKUN, S. 2009. Proximity-based access control for implantable medical devices. In Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, 410-419.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 410-419
-
-
Rasmussen, K.B.1
Castelluccia, C.2
Heydt-Benjamin, T.S.3
Capkun, S.4
-
40
-
-
33144472952
-
RFID Guardian: A battery-powered mobile device for RFID privacy management
-
Springer, Berlin
-
RIEBACK, M., CRISPO, B., AND TANENBAUM, A. 2008. RFID Guardian: A battery-powered mobile device for RFID privacy management. In Information Security and Privacy. Springer, Berlin, 259-273.
-
(2008)
Information Security and Privacy
, pp. 259-273
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
41
-
-
84948990100
-
The rc5 encryption algorithm
-
Springer
-
RIVEST, R. L. 1995. The rc5 encryption algorithm. In Fast Software Encryption. Springer, 86-96.
-
(1995)
Fast Software Encryption
, pp. 86-96
-
-
Rivest, R.L.1
-
43
-
-
85092032703
-
Security that is meant to be skin deep using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices
-
USENIX
-
SCHECHTER, S. 2010. Security that is Meant to be Skin Deep Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices. In HealthSec. USENIX.
-
(2010)
HealthSec
-
-
Schechter, S.1
-
44
-
-
0034825932
-
Cmos process compatible ie-flash (inverse gate electrode flash) technology for system-on-A-chip
-
SHUKURI, S., YANAGISAWA, K., AND ISHIBASHI, K. 2001. Cmos process compatible ie-flash (inverse gate electrode flash) technology for system-on-a-chip. In Proceedings of the IEEE Conference on Custom Integrated Circuits, 2001. 179-182.
-
(2001)
Proceedings of the IEEE Conference on Custom Integrated Circuits, 2001
, pp. 179-182
-
-
Shukuri, S.1
Yanagisawa, K.2
Ishibashi, K.3
-
46
-
-
33750345292
-
A wirelessly-powered platform for sensing and computation
-
Springer
-
SMITH, J. R., SAMPLE, A. P., POWLEDGE, P. S., ROY, S., AND MAMISHEV, A. 2006. A wirelessly-powered platform for sensing and computation. In UbiComp 2006: Ubiquitous Computing. Springer, 495-506.
-
(2006)
UbiComp 2006: Ubiquitous Computing
, pp. 495-506
-
-
Smith, J.R.1
Sample, A.P.2
Powledge, P.S.3
Roy, S.4
Mamishev, A.5
-
47
-
-
84860267053
-
An amulet for trustworthy wearable mhealth
-
ACM
-
SORBER, J., SHIN, M., PETERSON, R., CORNELIUS, C., MARE, S., PRASAD, A., MAROIS, Z., SMITHAYER, E., AND KOTZ, D. 2012. An amulet for trustworthy wearable mhealth. In Proceedings of the 12th Workshop on Mobile Computing Systems & Applications. ACM, 7.
-
(2012)
Proceedings of the 12th Workshop on Mobile Computing Systems & Applications
, pp. 7
-
-
Sorber, J.1
Shin, M.2
Peterson, R.3
Cornelius, C.4
Mare, S.5
Prasad, A.6
Marois, Z.7
Smithayer, E.8
Kotz, D.9
-
48
-
-
0024645334
-
An 8 bit microcomputer with analog subsystems for implantable biomedical application
-
STOTTS, L., INFINGER, K., BABKA, J., AND GENZER, D. 1989. An 8 bit microcomputer with analog subsystems for implantable biomedical application. IEEE Journal of Solid-State Circuits. 292-300.
-
(1989)
IEEE Journal of Solid-State Circuits
, pp. 292-300
-
-
Stotts, L.1
Infinger, K.2
Babka, J.3
Genzer, D.4
-
51
-
-
4644277489
-
An implantable telemetry platform system for in vivomonitoring of physiological parameters
-
VALDASTRI, P., MENCIASSI, A., ARENA, A., CACCAMO, C., AND DARIO, P. 2004. An implantable telemetry platform system for in vivomonitoring of physiological parameters. IEEE Transactions on Information Technology in Biomedicine. Vol. 8, 271-278.
-
(2004)
IEEE Transactions on Information Technology in Biomedicine
, vol.8
, pp. 271-278
-
-
Valdastri, P.1
Menciassi, A.2
Arena, A.3
Caccamo, C.4
Dario, P.5
-
54
-
-
0348011360
-
Pervasive healthcare
-
VARSHNEY, U. 2003. Pervasive healthcare. Computer 36, 12, 138-140.
-
(2003)
Computer
, vol.36
, Issue.12
, pp. 138-140
-
-
Varshney, U.1
-
55
-
-
11144327600
-
An on-chip programmable instrumentation microsystem for gastrointestinal telemetry applications
-
WANG, L., HAMMOND, P., JOHANNESSEN, E., TANG, T., ASTARAS, A., BEAUMONT, S., MURRAY, A., COOPER, J., AND CUMMING, D. 2004. An on-chip programmable instrumentation microsystem for gastrointestinal telemetry applications. In Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS'04). 2109-2112.
-
(2004)
Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS'04)
, pp. 2109-2112
-
-
Wang, L.1
Hammond, P.2
Johannessen, E.3
Tang, T.4
Astaras, A.5
Beaumont, S.6
Murray, A.7
Cooper, J.8
Cumming, D.9
-
56
-
-
0028407196
-
A low powermulti-sensor interface for injectable microprocessor-based animal monitoring system
-
WOUTERS, P.,COOMAN,M. D.,LAPADATU, D., AND PUERS, R. 1994. A low powermulti-sensor interface for injectable microprocessor-based animal monitoring system. Sensors and Actuators A: Physical. 41-42, 198-206.
-
(1994)
Sensors and Actuators A: Physical.
, vol.41-42
, pp. 198-206
-
-
Wouters, P.1
Cooman, M.D.2
Lapadatu, D.3
Puers, R.4
-
57
-
-
79960873920
-
IMDGuard: Securing implantable medical devices with the external wearable guardian
-
XU, F., QIN, Z., TAN, C. C.,WANG, B., AND LI, Q. 2011. IMDGuard: Securing implantable medical devices with the external wearable guardian. IEEE INFOCOM 1862-1870.
-
(2011)
IEEE Infocom
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.C.3
Wang, B.4
Li, Q.5
-
58
-
-
84876964630
-
Security analysis of a new ultra-lightweight RFID protocol and its improvement
-
ZHUANG, X.,WANG, Z.-H., CHANG, C.-C., AND ZHU, Y. 2013. Security analysis of a new ultra-lightweight RFID protocol and its improvement. Journal of Information Hiding and Multimedia Signal Processing 4, 3.
-
(2013)
Journal of Information Hiding and Multimedia Signal Processing
, vol.4
, pp. 3
-
-
Zhuang, X.1
Wang, Z.-H.2
Chang, C.-C.3
Zhu, Y.4
|