-
1
-
-
84874614312
-
Telemonitoring of the pacemakers
-
M. R. Das, Ed., InTech
-
U. Lakshmanadoss, A. Shah, and J. P. Daubert, "Telemonitoring of the pacemakers, " inModern Pacemakers-Present and Future, M. R. Das, Ed., pp. 129-146, InTech, 2011.
-
(2011)
Modern Pacemakers-Present and Future
, pp. 129-146
-
-
Lakshmanadoss, U.1
Shah, A.2
Daubert, J.P.3
-
2
-
-
38349178199
-
Security and privacy for implantable medical devices
-
D. Halperin, T. Kohno, T. S. Heydt-Benjamin, K. Fu, and W. H. Maisel, "Security and privacy for implantable medical devices, " IEEE Pervasive Computing, vol. 7, no. 1, pp. 30-39, 2008.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.1
, pp. 30-39
-
-
Halperin, D.1
Kohno, T.2
Heydt-Benjamin, T.S.3
Fu, K.4
Maisel, W.H.5
-
4
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
Oakland, Calif, USA, May
-
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, et al., "Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses, " in Proceedings of the IEEE Symposium on Security and Privacy (SP '08), pp. 129-142, Oakland, Calif, USA, May 2008.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy (SP '08)
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
-
5
-
-
80053973692
-
Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
-
Columbia, MO, USA, June 2011
-
C. Li, A. Raghunathan, and N. K. Jha, "Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system, " in Proceeding of the IEEE 13th International Conference on e-Health Networking, Applications and Services (HEALTHCOM '11), pp. 150-156, Columbia, MO, USA, June 2011.
-
Proceeding of the IEEE 13th International Conference on E-Health Networking, Applications and Services (HEALTHCOM '11)
, pp. 150-156
-
-
Li, C.1
Raghunathan, A.2
Jha, N.K.3
-
6
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
Chicago, Ill, USA, November
-
K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun, "Proximity-based access control for implantable medical devices, " in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 09), pp. 410-419, Chicago, Ill, USA, November 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 09)
, pp. 410-419
-
-
Rasmussen, K.B.1
Castelluccia, C.2
Heydt-Benjamin, T.S.3
Capkun, S.4
-
8
-
-
84935911815
-
-
U. S. Patent 7, 155, 290
-
J. A. vonArx, A. T. Koshiol, and J. E. Bange, "Secure long-range telemetry for implantablemedical device, " U. S. Patent 7, 155, 290, 2006.
-
(2006)
Secure Long-range Telemetry for Implantablemedical Device
-
-
Vonarx, J.A.1
Koshiol, A.T.2
Bange, J.E.3
-
9
-
-
79960873920
-
IMDGuard: Securing implantable medical devices with the external wearable guardian
-
Shanghai, China, April 2011
-
F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li, "IMDGuard: securing implantable medical devices with the external wearable guardian, " in Proceedings of the 30th IEEE International Conference on Computer Communications, pp. 1862-1870, Shanghai, China, April 2011.
-
Proceedings of the 30th IEEE International Conference on Computer Communications
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.C.3
Wang, B.4
Li, Q.5
-
10
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
Boston, Mass, USA
-
T. Denning, K. Fu, and T. Kohno, "Absence makes the heart grow fonder: new directions for implantable medical device security, " in Proceedings of the 3rd Conference on Hot Topics in Security, pp. 1-7, Boston, Mass, USA, 2008.
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security
, pp. 1-7
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
11
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
ACM
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: non-invasive security for implantable medical devices, " ACM Computer Communication Review, vol. 41, no. 4, pp. 2-13, 2011.
-
(2011)
Computer Communication Review
, vol.41
, Issue.4
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
12
-
-
77954020097
-
Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices
-
Atlanta, Ga, USA, April 2010
-
T. Denning, A. Borning, B. Friedman, B. T. Gill, T. Kohno, and W. H. Maisel, "Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices, " in Proceedings of the 28th Annual SIGCHI Conference on Human Factors in Computing Systems, pp. 917-926, Atlanta, Ga, USA, April 2010.
-
Proceedings of the 28th Annual SIGCHI Conference on Human Factors in Computing Systems
, pp. 917-926
-
-
Denning, T.1
Borning, A.2
Friedman, B.3
Gill, B.T.4
Kohno, T.5
Maisel, W.H.6
-
13
-
-
85092032703
-
Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices
-
Washington, DC, USA, August 2010
-
S. Schechter, "Security that is meant to be skin deep: using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices, " in Proceedings of the 1st USENIX Workshop on Health Security and Privacy, pp. 1-2, Washington, DC, USA, August 2010.
-
Proceedings of the 1st USENIX Workshop on Health Security and Privacy
, pp. 1-2
-
-
Schechter, S.1
-
14
-
-
84935887531
-
-
Medtronic CareLinkNetwork
-
Medtronic CareLinkNetwork, https://world. medtroniccarelink . net/.
-
-
-
-
15
-
-
84935906237
-
-
Biotronik Home Monitoring Service Center
-
Biotronik, Home Monitoring Service Center, http://www . biotronik. com/.
-
-
-
-
16
-
-
40649108378
-
Emerging technologies: Wireless communication systems for implantable medical devices
-
D. Panescu, "Emerging technologies: wireless communication systems for implantable medical devices, " IEEE Engineering in Medicine and Biology Magazine, vol. 27, no. 2, pp. 96-101, 2008.
-
(2008)
IEEE Engineering in Medicine and Biology Magazine
, vol.27
, Issue.2
, pp. 96-101
-
-
Panescu, D.1
-
17
-
-
84976295016
-
Distance-bounding protocols
-
Springer, New York, NY, USA
-
S. Brand s and D. Chaum, "Distance-bounding protocols, " in Advances in Cryptology-EUROCRYPT '93: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques Lof thus, Norway, May 23-27, 1993, vol. 765 of Lecture Notes in Computer Science, pp. 344-359, Springer, New York, NY, USA, 1994.
-
(1994)
Advances in Cryptology-EUROCRYPT '93: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques Lof Thus, Norway, May 23-27, 1993, Vol. 765 of Lecture Notes in Computer Science
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
18
-
-
1542317849
-
Secure Verification of Location Claims
-
San Diego, Calif, USA, September
-
N. Sastry, U. Shankar, and D. Wagner, "Secure Verification of Location Claims, " in Proceedings of the ACM Workshop on Wireless Security, pp. 1-10, San Diego, Calif, USA, September 2003.
-
(2003)
Proceedings of the ACM Workshop on Wireless Security
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
19
-
-
68949178835
-
Securing wireless implantable devices for healthcare: Ideas and challenges
-
K. Malasri and L. Wang, "Securing wireless implantable devices for healthcare: ideas and challenges, " IEEE Communications Magazine, vol. 47, no. 7, pp. 74-80, 2009.
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.7
, pp. 74-80
-
-
Malasri, K.1
Wang, L.2
-
20
-
-
0025386404
-
A logic of authentication
-
M. Burrow, M. Abadi, and R. Needham, "A logic of authentication, " ACM Transactions on Computer Systems, vol. 8, no. 1, pp. 18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrow, M.1
Abadi, M.2
Needham, R.3
-
21
-
-
0003899818
-
The Kerberos Network Authentication Service
-
July
-
C. Neuman, T. Yu, S. Hartman, and K. Raeburn, "The Kerberos Network Authentication Service, " RFC 4120, July 2005.
-
(2005)
RFC
, vol.4120
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
|