-
4
-
-
77649107719
-
Applications, challenges, and prospective in emerging body area networking technologies
-
Feb.
-
M. Patel and J. Wang, "Applications, challenges, and prospective in emerging body area networking technologies," Wireless Commun., vol. 17, no. 1, pp. 80-88, Feb. 2010.
-
(2010)
Wireless Commun.
, vol.17
, Issue.1
, pp. 80-88
-
-
Patel, M.1
Wang, J.2
-
5
-
-
84893755647
-
Wireless integrated network sensors: Low power systems on a chip
-
G. Asada, M. Dong, T. S. Lin, F. Newberg, G. Pottie, W. J. Kaiser, and H. O. Marcy, "Wireless integrated network sensors: Low power systems on a chip," in Proc. 24th European Solid-State Circuits Conference (ESSCIRC '98), 1998, pp. 9-16.
-
(1998)
Proc. 24th European Solid-State Circuits Conference (ESSCIRC '98)
, pp. 9-16
-
-
Asada, G.1
Dong, M.2
Lin, T.S.3
Newberg, F.4
Pottie, G.5
Kaiser, W.J.6
Marcy, H.O.7
-
6
-
-
85008023513
-
Will IEEE 802.15.4 make ubiquitous networking a reality?: A discussion on a potential low power, low bit rate standard
-
Jun.
-
J. Zheng and M. J. Lee, "Will IEEE 802.15.4 make ubiquitous networking a reality?: A discussion on a potential low power, low bit rate standard," IEEE Commun. Mag., vol. 42, no. 6, pp. 140-146, Jun. 2004.
-
(2004)
IEEE Commun. Mag.
, vol.42
, Issue.6
, pp. 140-146
-
-
Zheng, J.1
Lee, M.J.2
-
7
-
-
70350159185
-
An energy efficient implementation of on-demand MAC protocol in medical wireless body sensor networks
-
X. Zhang, H. Jiang, X. Chen, L. Zhang, and Z. Wang, "An energy efficient implementation of on-demand MAC protocol in medical wireless body sensor networks," in Proc. IEEE International Symposium on Circuits and Systems (ISCAS 2009), 2009, pp. 3094-3097.
-
(2009)
Proc. IEEE International Symposium on Circuits and Systems (ISCAS 2009)
, pp. 3094-3097
-
-
Zhang, X.1
Jiang, H.2
Chen, X.3
Zhang, L.4
Wang, Z.5
-
8
-
-
84864035796
-
A comprehensive survey of wireless body area networks
-
Jun.
-
S. Ullah, H. Higgins, B. Braem, B. Latre, C. Blondia, I. Moerman, S. Saleem, Z. Rahman, and K. S. Kwak, "A comprehensive survey of wireless body area networks," J. Med. Syst., vol. 36, no. 3, pp. 1065-1094, Jun. 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1065-1094
-
-
Ullah, S.1
Higgins, H.2
Braem, B.3
Latre, B.4
Blondia, C.5
Moerman, I.6
Saleem, S.7
Rahman, Z.8
Kwak, K.S.9
-
9
-
-
70350754650
-
Wireless communications technology in telehealth systems
-
A. Kailas and M. A. Ingram, "Wireless communications technology in telehealth systems," in Proc. 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology (Wireless VITAE 2009), 2009, pp. 926-930.
-
(2009)
Proc. 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology (Wireless VITAE 2009)
, pp. 926-930
-
-
Kailas, A.1
Ingram, M.A.2
-
12
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
May
-
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses," in Proc. 29th Annual IEEE Symposium on Security and Privacy (SP 2008), May 2008, pp. 129-142.
-
(2008)
Proc. 29th Annual IEEE Symposium on Security and Privacy (SP 2008)
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
13
-
-
84885719603
-
Inside risks: Controlling for cybersecurity risks of medical device software
-
Oct.
-
K. Fu and J. Blum, "Inside risks: Controlling for cybersecurity risks of medical device software," Communications of the ACM, vol. 56, no. 10, pp. 21-23, Oct. 2013.
-
(2013)
Communications of the ACM
, vol.56
, Issue.10
, pp. 21-23
-
-
Fu, K.1
Blum, J.2
-
14
-
-
84863537000
-
Design challenges for secure implantable medical devices
-
W. Burleson, S. S. Clark, B. Ransford, and K. Fu, "Design challenges for secure implantable medical devices," in Proc. 49th Annual Design Automation Conference (DAC '12), 2012, pp. 12-17.
-
(2012)
Proc. 49th Annual Design Automation Conference (DAC '12)
, pp. 12-17
-
-
Burleson, W.1
Clark, S.S.2
Ransford, B.3
Fu, K.4
-
17
-
-
38349178199
-
Security and privacy for implantable medical devices
-
Jan.
-
D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno, and W. H. Maisel, "Security and privacy for implantable medical devices," IEEE Pervasive Comput., vol. 7, no. 1, pp. 30-39, Jan. 2008.
-
(2008)
IEEE Pervasive Comput.
, vol.7
, Issue.1
, pp. 30-39
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Fu, K.3
Kohno, T.4
Maisel, W.H.5
-
18
-
-
80053973692
-
Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
-
C. Li, A. Raghunathan, and N. K. Jha, "Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system," in Proc. 13th IEEE International Conference on e-Health Networking Applications and Services (HealthCom 2011), 2011, pp. 150-156.
-
(2011)
Proc. 13th IEEE International Conference on E-Health Networking Applications and Services (HealthCom 2011)
, pp. 150-156
-
-
Li, C.1
Raghunathan, A.2
Jha, N.K.3
-
19
-
-
84879868277
-
Balancing security and utility in medical devices?
-
M. Rostami, W. Burleson, F. Koushanfar, and A. Juels, "Balancing security and utility in medical devices?" in Proc. 50th Annual Design Automation Conference (DAC '13), 2013, pp. 13:1-13:6.
-
(2013)
Proc. 50th Annual Design Automation Conference (DAC '13)
, pp. 1-6
-
-
Rostami, M.1
Burleson, W.2
Koushanfar, F.3
Juels, A.4
-
20
-
-
84879854202
-
Towards trustworthy medical devices and body area networks
-
M. Zhang, A. Raghunathan, and N. K. Jha, "Towards trustworthy medical devices and body area networks," in Proc. 50th Annual Design Automation Conference (DAC '13), 2013, pp. 14:1-14:6.
-
(2013)
Proc. 50th Annual Design Automation Conference (DAC '13)
, pp. 1-6
-
-
Zhang, M.1
Raghunathan, A.2
Jha, N.K.3
-
22
-
-
84881257572
-
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
-
D. Foo Kune, J. Backes, S. S. Clark, D. Kramer, M. Reynolds, K. Fu, Y. Kim, and W. Xu, "Ghost talk: Mitigating EMI signal injection attacks against analog sensors," in Proc. 34th Annual IEEE Symposium on Security and Privacy (SP 2013), 2013, pp. 145-159.
-
(2013)
Proc. 34th Annual IEEE Symposium on Security and Privacy (SP 2013)
, pp. 145-159
-
-
Foo Kune, D.1
Backes, J.2
Clark, S.S.3
Kramer, D.4
Reynolds, M.5
Fu, K.6
Kim, Y.7
Xu, W.8
-
23
-
-
84884618571
-
Protect your BSN: No handshakes, just namaste!
-
P. Bagade, A. Banerjee, J. Milazzo, and S. K. S. Gupta, "Protect your BSN: No handshakes, just namaste!" in IEEE International Conference on Body Sensor Networks (BSN), 2013, pp. 1-6.
-
(2013)
IEEE International Conference on Body Sensor Networks (BSN)
, pp. 1-6
-
-
Bagade, P.1
Banerjee, A.2
Milazzo, J.3
Gupta, S.K.S.4
-
25
-
-
84890216144
-
-
Wiley
-
K. Sohraby, D. Minoli, and T. Znati, Wireless Sensor Networks: Technology, Protocols, and Applications. Wiley, 2007.
-
(2007)
Wireless Sensor Networks: Technology, Protocols, and Applications
-
-
Sohraby, K.1
Minoli, D.2
Znati, T.3
-
26
-
-
51349129063
-
Sensor networks for medical care
-
V. Shnayder, B. Chen, K. Lorincz, T. R. F. Fulford Jones, and M. Welsh, "Sensor networks for medical care," in Proc. 3rd International Conference on Embedded Networked Sensor Systems (SenSys '05), 2005, p. 314.
-
(2005)
Proc. 3rd International Conference on Embedded Networked Sensor Systems (SenSys '05)
, pp. 314
-
-
Shnayder, V.1
Chen, B.2
Lorincz, K.3
Fulford Jones, T.R.F.4
Welsh, M.5
-
30
-
-
84862026261
-
From verification to implementation: A model translation tool and a pacemaker case study
-
M. Pajic, Z. Jiang, I. Lee, O. Sokolsky, and R. Mangharam, "From verification to implementation: A model translation tool and a pacemaker case study," in Proc. IEEE 18th Real Time and Embedded Technology and Applications Symposium (RTAS '12), 2012, pp. 173-184.
-
(2012)
Proc. IEEE 18th Real Time and Embedded Technology and Applications Symposium (RTAS '12)
, pp. 173-184
-
-
Pajic, M.1
Jiang, Z.2
Lee, I.3
Sokolsky, O.4
Mangharam, R.5
-
31
-
-
59449102982
-
Leads and longevity: How long will your pacemaker last?
-
R. K. Shepard and K. A. Ellenbogen, "Leads and longevity: How long will your pacemaker last?" Europace, vol. 11, no. 2, pp. 142-143, 2009.
-
(2009)
Europace
, vol.11
, Issue.2
, pp. 142-143
-
-
Shepard, R.K.1
Ellenbogen, K.A.2
-
33
-
-
79951723271
-
A survey on wireless body area networks
-
Jan.
-
B. Latré, B. Braem, I. Moerman, C. Blondia, and P. Demeester, "A survey on wireless body area networks," Wireless Networks, vol. 17, no. 1, pp. 1-18, Jan. 2011.
-
(2011)
Wireless Networks
, vol.17
, Issue.1
, pp. 1-18
-
-
Latré, B.1
Braem, B.2
Moerman, I.3
Blondia, C.4
Demeester, P.5
-
34
-
-
84866479768
-
Toward a safe integrated clinical environment: A communication security perspective
-
D. Foo Kune, K. K. Venkatasubramanian, E. Vasserman, I. Lee, and Y. Kim, "Toward a safe integrated clinical environment: A communication security perspective," in Proc. 2012 ACM workshop on Medical Communication Systems, 2012, pp. 7-12.
-
(2012)
Proc. 2012 ACM Workshop on Medical Communication Systems
, pp. 7-12
-
-
Foo Kune, D.1
Venkatasubramanian, K.K.2
Vasserman, E.3
Lee, I.4
Kim, Y.5
-
35
-
-
57649243059
-
Developing a standard for personal health devices based on 11073
-
M. Clarke, D. Bogia, K. Hassing, L. Steubesand, T. Chan, and D. Ayyagari, "Developing a standard for personal health devices based on 11073," in Proc. 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS 2007), 2007, pp. 6174-6176.
-
(2007)
Proc. 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS 2007)
, pp. 6174-6176
-
-
Clarke, M.1
Bogia, D.2
Hassing, K.3
Steubesand, L.4
Chan, T.5
Ayyagari, D.6
-
39
-
-
77954020097
-
Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices
-
T. Denning, A. Borning, B. Friedman, B. T. Gill, T. Kohno, and W. H. Maisel, "Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices," in Proc. SIGCHI Conference on Human Factors in Computing Systems (CHI '10), 2010, pp. 917-926.
-
(2010)
Proc. SIGCHI Conference on Human Factors in Computing Systems (CHI '10)
, pp. 917-926
-
-
Denning, T.1
Borning, A.2
Friedman, B.3
Gill, B.T.4
Kohno, T.5
Maisel, W.H.6
-
40
-
-
84863011893
-
Security issues in healthcare applications using wireless medical sensor networks: A survey
-
P. Kumar and H.-J. Lee, "Security issues in healthcare applications using wireless medical sensor networks: A survey," Sensors, vol. 12, no. 1, pp. 55-91, 2011.
-
(2011)
Sensors
, vol.12
, Issue.1
, pp. 55-91
-
-
Kumar, P.1
Lee, H.-J.2
-
41
-
-
84860308263
-
Privacy in mobile technology for personal healthcare
-
Dec.
-
S. Avancha, A. Baxi, and D. Kotz, "Privacy in mobile technology for personal healthcare," ACM Comput. Surv., vol. 45, no. 1, pp. 3:1-3:54, Dec. 2012.
-
(2012)
ACM Comput. Surv.
, vol.45
, Issue.1
, pp. 1-54
-
-
Avancha, S.1
Baxi, A.2
Kotz, D.3
-
42
-
-
0035388827
-
Characteristics of radio transmitter fingerprints
-
K. Ellis and N. Serinken, "Characteristics of radio transmitter fingerprints," Radio Science, vol. 36, no. 4, pp. 585-597, 2001.
-
(2001)
Radio Science
, vol.36
, Issue.4
, pp. 585-597
-
-
Ellis, K.1
Serinken, N.2
-
47
-
-
84879861042
-
OPFKA: Secure and efficient ordered-physiologicalfeature-based key agreement for wireless body area networks
-
C. Hu, X. Cheng, F. Zhang, D. Wu, X. Liao, and D. Chen, "OPFKA: Secure and efficient ordered-physiologicalfeature-based key agreement for wireless body area networks," Proc. 32nd IEEE International Conference on Computer Communications (INFOCOM 2013), 2013.
-
(2013)
Proc. 32nd IEEE International Conference on Computer Communications (INFOCOM 2013)
-
-
Hu, C.1
Cheng, X.2
Zhang, F.3
Wu, D.4
Liao, X.5
Chen, D.6
-
48
-
-
84879516937
-
ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks
-
L. Shi, J. Yuan, S. Yu, and M. Li, "ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks," in Proc. 6th ACM conference on Security and privacy in wireless and mobile networks (WiSec '13), 2013, pp. 155-166.
-
(2013)
Proc. 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
, pp. 155-166
-
-
Shi, L.1
Yuan, J.2
Yu, S.3
Li, M.4
-
49
-
-
84881523410
-
Analysis of safety-critical computer failures in medical devices
-
H. Alemzadeh, R. Iyer, Z. Kalbarczyk, and J. Raman, "Analysis of safety-critical computer failures in medical devices," IEEE Security Privacy, vol. 11, no. 4, pp. 14-26, 2013.
-
(2013)
IEEE Security Privacy
, vol.11
, Issue.4
, pp. 14-26
-
-
Alemzadeh, H.1
Iyer, R.2
Kalbarczyk, Z.3
Raman, J.4
-
50
-
-
84881228641
-
On limitations of friendly jamming for confidentiality
-
N. O. Tippenhauer, L. Malisa, A. Ranganathan, and S. Čapkun, "On limitations of friendly jamming for confidentiality," in Proc. 34th Annual IEEE Symposium on Security and Privacy (SP 2013), 2013, pp. 160-173.
-
(2013)
Proc. 34th Annual IEEE Symposium on Security and Privacy (SP 2013)
, pp. 160-173
-
-
Tippenhauer, N.O.1
Malisa, L.2
Ranganathan, A.3
Čapkun, S.4
-
51
-
-
84893849701
-
MedMon: Securing medical devices through wireless monitoring and anomaly detection
-
Dec.
-
M. Zhang, A. Raghunathan, and N. Jha, "MedMon: Securing medical devices through wireless monitoring and anomaly detection," IEEE Trans. Biomed. Circuits Syst., vol. 7, no. 6, pp. 871-881, Dec. 2013.
-
(2013)
IEEE Trans. Biomed. Circuits Syst.
, vol.7
, Issue.6
, pp. 871-881
-
-
Zhang, M.1
Raghunathan, A.2
Jha, N.3
-
52
-
-
85092069836
-
Body area network security: Robust key establishment using human body channel
-
Aug.
-
S. Chang, Y. Hu, H. Anderson, T. Fu, and E. Y. L. Huang, "Body area network security: Robust key establishment using human body channel," in Proc. 3rd USENIX Workshop on Health Security and Privacy (HealthSec), vol. 37, no. 6, Aug. 2012.
-
(2012)
Proc. 3rd USENIX Workshop on Health Security and Privacy (HealthSec)
, vol.37
, Issue.6
-
-
Chang, S.1
Hu, Y.2
Anderson, H.3
Fu, T.4
Huang, E.Y.L.5
-
53
-
-
84864058685
-
Security and privacy qualities of medical devices: An analysis of FDA postmarket surveillance
-
Jul.
-
D. B. Kramer, M. Baker, B. Ransford, A. Molina-Markham, Q. Stewart, K. Fu, and M. R. Reynolds, "Security and privacy qualities of medical devices: An analysis of FDA postmarket surveillance," PLoS ONE, vol. 7, p. e40200, Jul. 2012.
-
(2012)
PLoS ONE
, vol.7
, pp. e40200
-
-
Kramer, D.B.1
Baker, M.2
Ransford, B.3
Molina-Markham, A.4
Stewart, Q.5
Fu, K.6
Reynolds, M.R.7
-
54
-
-
84860670073
-
BANA: Body area network authentication exploiting channel characteristics
-
L. Shi, M. Li, S. Yu, and J. Yuan, "BANA: Body area network authentication exploiting channel characteristics," in Proc. 5th ACM conference on Security and Privacy in Wireless and Mobile Networks (WiSec '12), 2012, pp. 27-38.
-
(2012)
Proc. 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '12)
, pp. 27-38
-
-
Shi, L.1
Li, M.2
Yu, S.3
Yuan, J.4
-
55
-
-
85076227478
-
On the feasibility of side-channel attacks with brain-computer interfaces
-
I. Martinovic, D. Davies, M. Frank, D. Perito, T. Ros, and D. Song, "On the feasibility of side-channel attacks with brain-computer interfaces," in Proc. 21st USENIX Security Symposium (USENIX Security '12), 2012, p. 34.
-
(2012)
Proc. 21st USENIX Security Symposium (USENIX Security '12)
, pp. 34
-
-
Martinovic, I.1
Davies, D.2
Frank, M.3
Perito, D.4
Ros, T.5
Song, D.6
-
56
-
-
76849098534
-
PSKA: Usable and secure key agreement scheme for body area networks
-
K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "PSKA: Usable and secure key agreement scheme for body area networks," IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 1, pp. 60-68, 2010.
-
(2010)
IEEE Trans. Inf. Technol. Biomed.
, vol.14
, Issue.1
, pp. 60-68
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.K.S.3
-
58
-
-
77958454649
-
Real-time heart model for implantable cardiac device validation and verification
-
Z. Jiang, M. Pajic, A. Connolly, S. Dixit, and R. Mangharam, "Real-time heart model for implantable cardiac device validation and verification," in Proc. 2010 22nd Euromicro Conference on Real-Time Systems (ECRTS '10), 2010, pp. 239-248.
-
(2010)
Proc. 2010 22nd Euromicro Conference on Real-Time Systems (ECRTS '10)
, pp. 239-248
-
-
Jiang, Z.1
Pajic, M.2
Connolly, A.3
Dixit, S.4
Mangharam, R.5
-
59
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
Aug.
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: Non-invasive security for implantable medical devices," SIGCOMM Comput. Commun. Rev., vol. 41, no. 4, pp. 2-13, Aug. 2011.
-
(2011)
SIGCOMM Comput. Commun. Rev.
, vol.41
, Issue.4
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
60
-
-
77954990804
-
Physiological value-based efficient usable security solutions for body sensor networks
-
Jul.
-
K. K. Venkatasubramanian and S. K. S. Gupta, "Physiological value-based efficient usable security solutions for body sensor networks," ACM Trans. Sen. Netw. (TOSN), vol. 6, no. 4, pp. 31:1-31:36, Jul. 2010.
-
(2010)
ACM Trans. Sen. Netw. (TOSN)
, vol.6
, Issue.4
, pp. 1-36
-
-
Venkatasubramanian, K.K.1
Gupta, S.K.S.2
-
62
-
-
79960873920
-
IMDGuard: Securing implantable medical devices with the external wearable guardian
-
F. Xu, Z. Qin, C. Tan, B. Wang, and Q. Li, "IMDGuard: Securing implantable medical devices with the external wearable guardian," in Proc. 30th IEEE International Conference on Computer Communications (INFOCOM 2011), 2011, pp. 1862-1870.
-
(2011)
Proc. 30th IEEE International Conference on Computer Communications (INFOCOM 2011)
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.3
Wang, B.4
Li, Q.5
-
63
-
-
79551649543
-
Defending resource depletion attacks on implantable medical devices
-
X. Hei, X. Du, J. Wu, and F. Hu, "Defending resource depletion attacks on implantable medical devices," in Proc. IEEE Global Telecommunications Conference (GLOBECOM 2010), 2010, pp. 1-5.
-
(2010)
Proc. IEEE Global Telecommunications Conference (GLOBECOM 2010)
, pp. 1-5
-
-
Hei, X.1
Du, X.2
Wu, J.3
Hu, F.4
-
64
-
-
78650759211
-
Plethysmogram-based secure inter-sensor communication in body area networks
-
Nov.
-
K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "Plethysmogram-based secure inter-sensor communication in body area networks," in Proc. Military Communications Conference (MILCOM 2008), Nov. 2008, pp. 1-7.
-
(2008)
Proc. Military Communications Conference (MILCOM 2008)
, pp. 1-7
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.K.S.3
-
65
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Čapkun, "Proximity-based access control for implantable medical devices," in Proc. 16th ACM conference on Computer and Communications Security (CCS 2009), 2009, pp. 410-419.
-
(2009)
Proc. 16th ACM Conference on Computer and Communications Security (CCS 2009)
, pp. 410-419
-
-
Rasmussen, K.B.1
Castelluccia, C.2
Heydt-Benjamin, T.S.3
Čapkun, S.4
-
66
-
-
67651015355
-
Neurosecurity: Security and privacy for neural devices
-
Jul.
-
T. Denning, Y. Matsuoka, and T. Kohno, "Neurosecurity: Security and privacy for neural devices," Journal of Neurosurgery: Pediatrics, vol. 27, no. 1, p. E7, Jul. 2009.
-
(2009)
Journal of Neurosurgery: Pediatrics
, vol.27
, Issue.1
, pp. E7
-
-
Denning, T.1
Matsuoka, Y.2
Kohno, T.3
-
67
-
-
84922512713
-
The practical subtleties of biometric key generation
-
L. Ballard, S. Kamara, and M. K. Reiter, "The practical subtleties of biometric key generation," in Proc. 17th conference on Security Symposium (SS '08), 2008, pp. 61-74.
-
(2008)
Proc. 17th Conference on Security Symposium (SS '08)
, pp. 61-74
-
-
Ballard, L.1
Kamara, S.2
Reiter, M.K.3
-
68
-
-
51049107527
-
EKG-based key agreement in body sensor networks
-
K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "EKG-based key agreement in body sensor networks," in Proc. 2nd Workshop on Mission Critical Networks (INFOCOM Workshops 2008), 2008, pp. 1-6.
-
(2008)
Proc. 2nd Workshop on Mission Critical Networks (INFOCOM Workshops 2008)
, pp. 1-6
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.K.S.3
-
69
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
T. Denning, K. Fu, and T. Kohno, "Absence makes the heart grow fonder: New directions for implantable medical device security," in Proc. 3rd conference on Hot Topics in Security (HotSec '08), 2008, pp. 5:1-5:7.
-
(2008)
Proc. 3rd Conference on Hot Topics in Security (HotSec '08)
, pp. 1-7
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
71
-
-
84939435969
-
BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, "BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," in Proc. International Conference on Parallel Processing Workshops, 2003, pp. 432-439.
-
(2003)
Proc. International Conference on Parallel Processing Workshops
, pp. 432-439
-
-
Cherukuri, S.1
Venkatasubramanian, K.K.2
Gupta, S.K.S.3
-
72
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
-
C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Commun. Mag., vol. 44, no. 4, pp. 73-81, 2006.
-
(2006)
IEEE Commun. Mag.
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.C.Y.1
Zhang, Y.-T.2
Bao, S.-D.3
-
73
-
-
84876065473
-
Secure ad hoc trust initialization and key management in wireless body area networks
-
Apr.
-
M. Li, S. Yu, J. D. Guttman, W. Lou, and K. Ren, "Secure ad hoc trust initialization and key management in wireless body area networks," ACM Trans. Sen. Netw. (TOSN), vol. 9, no. 2, pp. 18:1-18:35, Apr. 2013.
-
(2013)
ACM Trans. Sen. Netw. (TOSN)
, vol.9
, Issue.2
, pp. 1-35
-
-
Li, M.1
Yu, S.2
Guttman, J.D.3
Lou, W.4
Ren, K.5
-
74
-
-
84891050675
-
Body area network security: A fuzzy attribute-based signcryption scheme
-
Sep.
-
C. Hu, N. Zhang, H. Li, X. Cheng, and X. Liao, "Body area network security: A fuzzy attribute-based signcryption scheme," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 37-46, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 37-46
-
-
Hu, C.1
Zhang, N.2
Li, H.3
Cheng, X.4
Liao, X.5
-
75
-
-
77951014466
-
Biometrics based novel key distribution solution for body sensor networks
-
F. Miao, L. Jiang, Y. Li, and Y.-T. Zhang, "Biometrics based novel key distribution solution for body sensor networks," in Proc. Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2009), 2009, pp. 2458-2461.
-
(2009)
Proc. Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2009)
, pp. 2458-2461
-
-
Miao, F.1
Jiang, L.2
Li, Y.3
Zhang, Y.-T.4
-
76
-
-
78650836556
-
A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health
-
G. Zhang, C. C. Y. Poon, and Y. Zhang, "A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health," in Proc. Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2010), 2010, pp. 2034-2036.
-
(2010)
Proc. Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2010)
, pp. 2034-2036
-
-
Zhang, G.1
Poon, C.C.Y.2
Zhang, Y.3
-
77
-
-
85092017530
-
Take two software updates and see me in the morning: The case for software security evaluations of medical devices
-
S. Hanna, R. Rolles, A. Molina-Markham, P. Poosankam, K. Fu, and D. Song, "Take two software updates and see me in the morning: The case for software security evaluations of medical devices," in Proc. 2nd USENIX conference on Health Security and Privacy (HealthSec '11), 2011, p. 6.
-
(2011)
Proc. 2nd USENIX Conference on Health Security and Privacy (HealthSec '11)
, pp. 6
-
-
Hanna, S.1
Rolles, R.2
Molina-Markham, A.3
Poosankam, P.4
Fu, K.5
Song, D.6
-
80
-
-
84976295016
-
Distance-bounding protocols
-
ser. Lecture Notes in Computer Science
-
S. Brands and D. Chaum, "Distance-bounding protocols," in Advances in Cryptology - EUROCRYPT'93, ser. Lecture Notes in Computer Science, vol. 765, 1994, pp. 344-359.
-
(1994)
Advances in Cryptology - EUROCRYPT'93
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
82
-
-
70349301622
-
RFIDs and secret handshakes: Defending against ghost-andleech attacks and unauthorized reads with context-aware communications
-
A. Czeskis, K. Koscher, J. R. Smith, and T. Kohno, "RFIDs and secret handshakes: Defending against ghost-andleech attacks and unauthorized reads with context-aware communications," in Proc. 15th ACM conference on Computer and Communications Security (CCS 2008), 2008, pp. 479-490.
-
(2008)
Proc. 15th ACM Conference on Computer and Communications Security (CCS 2008)
, pp. 479-490
-
-
Czeskis, A.1
Koscher, K.2
Smith, J.R.3
Kohno, T.4
-
83
-
-
84868335627
-
Distance hijacking attacks on distance bounding protocols
-
C. Cremers, K. B. Rasmussen, B. Schmidt, and S. Čapkun, "Distance hijacking attacks on distance bounding protocols," in Proc. 33rd Annual IEEE Symposium on Security and Privacy (SP 2012), 2012, pp. 113-127.
-
(2012)
Proc. 33rd Annual IEEE Symposium on Security and Privacy (SP 2012)
, pp. 113-127
-
-
Cremers, C.1
Rasmussen, K.B.2
Schmidt, B.3
Čapkun, S.4
-
84
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun, "Loud and clear: Human-verifiable authentication based on audio," in Proc. 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006, p. 10.
-
(2006)
Proc. 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006)
, pp. 10
-
-
Goodrich, M.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
85
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '11), 2011, pp. 3-14.
-
(2011)
Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '11)
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
87
-
-
79961131935
-
Model-based closed-loop testing of implantable pacemakers
-
Z. Jiang, M. Pajic, and R. Mangharam, "Model-based closed-loop testing of implantable pacemakers," in Proc. IEEE/ACM 2nd International Conference on Cyber-Physical Systems, 2011, pp. 131-140.
-
(2011)
Proc. IEEE/ACM 2nd International Conference on Cyber-Physical Systems
, pp. 131-140
-
-
Jiang, Z.1
Pajic, M.2
Mangharam, R.3
-
88
-
-
84155160693
-
-
Jul.
-
K. Sandler, L. Ohrstrom, L. Moy, and R. McVay, "Killed by code: Software transparency in implantable medical devices," http://www.softwarefreedom.org, Jul. 2010.
-
(2010)
Killed by Code: Software Transparency in Implantable Medical Devices
-
-
Sandler, K.1
Ohrstrom, L.2
Moy, L.3
McVay, R.4
-
90
-
-
84914099332
-
-
(Mar.)
-
(2014, Mar.) Peach fuzzer. http://peachfuzzer.com/.
-
(2014)
Peach Fuzzer
-
-
-
93
-
-
14844283547
-
PhysioBank, PhysioToolkit, and PhysioNet: Components of a new research resource for complex physiologic signals
-
Jun.
-
A. L. Goldberger, L. A. N. Amaral, L. Glass, J. M. Hausdorff, P. C. Ivanov, R. G. Mark, J. E. Mietus, G. B. Moody, C. Peng, and H. E. Stanley, "PhysioBank, PhysioToolkit, and PhysioNet: Components of a new research resource for complex physiologic signals," Circulation, vol. 101, no. 23, pp. e215-e220, Jun. 2000.
-
(2000)
Circulation
, vol.101
, Issue.23
, pp. e215-e220
-
-
Goldberger, A.L.1
Amaral, L.A.N.2
Glass, L.3
Hausdorff, J.M.4
Ivanov, P.C.5
Mark, R.G.6
Mietus, J.E.7
Moody, G.B.8
Peng, C.9
Stanley, H.E.10
-
94
-
-
0035716807
-
On the presence of deterministic chaos in HRV signals
-
I. Radojičić, D. Mandić, and D. Vulić, "On the presence of deterministic chaos in HRV signals," in Computers in Cardiology 2001, 2001, pp. 465-468.
-
(2001)
Computers in Cardiology 2001
, pp. 465-468
-
-
Radojičić, I.1
Mandić, D.2
Vulić, D.3
-
96
-
-
84862114860
-
A closer look at security in random number generators design
-
ser. Lecture Notes in Computer Science
-
V. Fischer, "A closer look at security in random number generators design," in Constructive Side-Channel Analysis and Secure Design, ser. Lecture Notes in Computer Science, 2012, vol. 7275, pp. 167-182.
-
(2012)
Constructive Side-Channel Analysis and Secure Design
, vol.7275
, pp. 167-182
-
-
Fischer, V.1
-
97
-
-
21144449843
-
Evaluation criteria for true (physical) random number generators used in cryptographic applications
-
ser. Lecture Notes in Computer Science
-
W. Schindler and W. Killmann, "Evaluation criteria for true (physical) random number generators used in cryptographic applications," in Cryptographic Hardware and Embedded Systems (CHES 2002), ser. Lecture Notes in Computer Science, 2003, vol. 2523, pp. 431-449.
-
(2003)
Cryptographic Hardware and Embedded Systems (CHES 2002)
, vol.2523
, pp. 431-449
-
-
Schindler, W.1
Killmann, W.2
-
98
-
-
79551572458
-
Advancements in noncontact, multiparameter physiological measurements using a webcam
-
Jan.
-
M. Poh, D. J. McDuff, and R. W. Picard, "Advancements in noncontact, multiparameter physiological measurements using a webcam," IEEE Trans. Biomed. Eng., vol. 58, no. 1, pp. 7-11, Jan. 2011.
-
(2011)
IEEE Trans. Biomed. Eng.
, vol.58
, Issue.1
, pp. 7-11
-
-
Poh, M.1
McDuff, D.J.2
Picard, R.W.3
-
99
-
-
84880942977
-
Validation of heart rate extraction using video imaging on a built-in camera system of a smartphone
-
Aug.
-
S. Kwon, H. Kim, and K. S. Park, "Validation of heart rate extraction using video imaging on a built-in camera system of a smartphone," in Proc. Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2012), Aug. 2012, pp. 2174-2177.
-
(2012)
Proc. Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2012)
, pp. 2174-2177
-
-
Kwon, S.1
Kim, H.2
Park, K.S.3
-
100
-
-
84872230687
-
Eulerian video magnification for revealing subtle changes in the world
-
Jul.
-
H. Wu, M. Rubinstein, E. Shih, J. Guttag, F. Durand, and W. Freeman, "Eulerian video magnification for revealing subtle changes in the world," ACM Trans. Graph. (SIGGRAPH), pp. 65:1-65:8, Jul. 2012.
-
(2012)
ACM Trans. Graph. (SIGGRAPH)
, pp. 1-8
-
-
Wu, H.1
Rubinstein, M.2
Shih, E.3
Guttag, J.4
Durand, F.5
Freeman, W.6
|