-
1
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zeropower defenses
-
D. T. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zeropower defenses," in IEEE Symposium on Security and Privacy, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Halperin, D.T.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
2
-
-
23944466429
-
Safety issues involving medical devices
-
W. Maisel, "Safety issues involving medical devices," J. Am. Medical Assoc, vol. 294, pp. 955-985, 2005.
-
(2005)
J. Am. Medical Assoc
, vol.294
, pp. 955-985
-
-
Maisel, W.1
-
3
-
-
68949178835
-
Securing wireless implantable devices for healthcare: Ideas and challenges
-
K. Malasri and L. Wang, "Securing wireless implantable devices for healthcare: Ideas and challenges," IEEE Comm. Mag., vol. 47. 7, pp. 74-80, 2009.
-
(2009)
IEEE Comm. Mag.
, vol.47
, Issue.7
, pp. 74-80
-
-
Malasri, K.1
Wang, L.2
-
4
-
-
67449084060
-
Inside risks: Reducing risks of implantable medical devices
-
K. Fu, "Inside risks: Reducing risks of implantable medical devices," Communications of the ACM, vol. 52. 6, pp. 25-27, 2009.
-
(2009)
Communications of the ACM
, vol.52
, Issue.6
, pp. 25-27
-
-
Fu, K.1
-
5
-
-
67651015355
-
Neurosecurity: Security and privacy for neural devices
-
T. Denning, Y. Matsuoka, and T. Kohno, "Neurosecurity: Security and privacy for neural devices," Journal of Neurosurgery: Pediatrics, vol. 27, p. E7, 2009.
-
(2009)
Journal of Neurosurgery: Pediatrics
, vol.27
, pp. E7
-
-
Denning, T.1
Matsuoka, Y.2
Kohno, T.3
-
6
-
-
77950500674
-
Improving the security and privacy of implantable medical devices
-
W. H. Maisel and K. Tadayoshi, "Improving the security and privacy of implantable medical devices," New England journal of medicine, vol. 362. 13, p. 1164, 2010.
-
(2010)
New England Journal of Medicine
, vol.362
, Issue.13
-
-
Maisel, W.H.1
Tadayoshi, K.2
-
7
-
-
84925366321
-
-
Springer, 2013, ch. Securing legacy mobile medical devices
-
V. Pournaghshband, M. Sarrafzadeh, and P. Reiheret, Wireless Mobile Communication and Healthcare. Springer, 2013, ch. Securing legacy mobile medical devices, pp. 163-172.
-
Wireless Mobile Communication and Healthcare
, pp. 163-172
-
-
Pournaghshband, V.1
Sarrafzadeh, M.2
Reiheret, P.3
-
8
-
-
33745853759
-
Security issues of wireless sensor networks in healthcare applications
-
H. S. Ng, M. L. Sim, and C. M. Tan, "Security issues of wireless sensor networks in healthcare applications," BT Technology Journal, vol. 24. 2, pp. 138-144, 2006.
-
(2006)
BT Technology Journal
, vol.24
, Issue.2
, pp. 138-144
-
-
Ng, H.S.1
Sim, M.L.2
Tan, C.M.3
-
10
-
-
84883076209
-
Pipac: Patient infusion pattern based access control scheme for wireless insulin pump system
-
X. Hei, X. Du, S. Lin, and I. Lee, "Pipac: patient infusion pattern based access control scheme for wireless insulin pump system," in IEEE INFOCOM, 2013.
-
(2013)
IEEE INFOCOM
-
-
Hei, X.1
Du, X.2
Lin, S.3
Lee, I.4
-
11
-
-
77956045650
-
Researchers fight to keep implanted medical devices safe from hackers
-
N. Leavitt, "Researchers fight to keep implanted medical devices safe from hackers," Computer, vol. 43. 8, pp. 11-14, 2010.
-
(2010)
Computer
, vol.43
, Issue.8
, pp. 11-14
-
-
Leavitt, N.1
-
12
-
-
38349178199
-
Security and privacy for implantable medical devices
-
D. Halperin, T. Kohno, T. S. Heydt-Benjamin, K. Fu, and W. H. Maisel., "Security and privacy for implantable medical devices," Pervasive Computing, IEEE, vol. 7. 1, pp. 30-39, 2008.
-
(2008)
Pervasive Computing, IEEE
, vol.7
, Issue.1
, pp. 30-39
-
-
Halperin, D.1
Kohno, T.2
Heydt-Benjamin, T.S.3
Fu, K.4
Maisel, W.H.5
-
13
-
-
59249083926
-
Design and implementation of a secure wireless mote-based medical sensor network
-
K. Malasri and L. Wang, "Design and implementation of a secure wireless mote-based medical sensor network," in Proc. 10th Int'l. Conf. Ubiquitous Computing, 2008.
-
(2008)
Proc. 10th Int'l. Conf. Ubiquitous Computing
-
-
Malasri, K.1
Wang, L.2
-
14
-
-
33750030809
-
Implementation of security policy for clinical information systems over wireless sensor networks
-
J. Misic and V. B. Misic, "Implementation of security policy for clinical information systems over wireless sensor networks," Ad Hoc Net., pp. 134-144, 2007.
-
(2007)
Ad Hoc Net.
, pp. 134-144
-
-
Misic, J.1
Misic, V.B.2
-
15
-
-
84925376140
-
-
Springer, 2000, ch. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
M. Bellare and N. Chanathip, Advances in Cryptology-ASIACRYPT. Springer, 2000, ch. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, pp. 531-545.
-
Advances in Cryptology-ASIACRYPT
, pp. 531-545
-
-
Bellare, M.1
Chanathip, N.2
-
16
-
-
84925350987
-
-
Springer, ch. Solutions for the storage problem of mceliece public and private keys on memoryconstrained platforms
-
F. Strenzke, Information Security. Springer, 2012, ch. Solutions for the storage problem of mceliece public and private keys on memoryconstrained platforms, pp. 120-135.
-
(2012)
Information Security
, pp. 120-135
-
-
Strenzke, F.1
-
17
-
-
84939435969
-
Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
S. Cherukuri, K. Venkatasubramanian, and S. Gupta, "Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," in Int. Conference on Parallel Processing Workshops, 2003.
-
(2003)
Int. Conference on Parallel Processing Workshops
-
-
Cherukuri, S.1
Venkatasubramanian, K.2
Gupta, S.3
-
18
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
-
C. Poon, Y. Zhang, and S. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Communications Magazine, vol. 44(4), pp. 73-81, 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.1
Zhang, Y.2
Bao, S.3
-
19
-
-
56649112965
-
Using the timing information of heartbeats as an entity identifier to secure body sensor network
-
S. Bao, C. Poon, Y. Zhang, and L. Shen, "Using the timing information of heartbeats as an entity identifier to secure body sensor network," IEEE Trans Inf Technol Biomed., vol. 12(6), pp. 772-9, 2008.
-
(2008)
IEEE Trans Inf Technol Biomed.
, vol.12
, Issue.6
, pp. 772-779
-
-
Bao, S.1
Poon, C.2
Zhang, Y.3
Shen, L.4
-
20
-
-
76849098534
-
Pska: Usable and secure key agreement scheme for body area networks
-
K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "Pska: Usable and secure key agreement scheme for body area networks," IEEE Trans. Inf. Technol. Biomed., vol. 14. 1, pp. 60-68, 2010.
-
(2010)
IEEE Trans. Inf. Technol. Biomed.
, vol.14
, Issue.1
, pp. 60-68
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.K.S.3
-
21
-
-
79960873920
-
Imdguard: Securing implantable medical devices with the external wearable guardian
-
F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li, "Imdguard: Securing implantable medical devices with the external wearable guardian," in IEEE INFOCOM Proc., 2011.
-
(2011)
IEEE INFOCOM Proc
-
-
Xu, F.1
Qin, Z.2
Tan, C.C.3
Wang, B.4
Li, Q.5
-
22
-
-
77954020097
-
Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices
-
T. Denning, A. Borning, B. Friedman, B. T. Gill, T. Kohno, and W. H. Maisel, "Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices," in in Proc. SIGCHI Conference on Human Factors in Computing Systems (CHI'10), 2010.
-
(2010)
Proc. SIGCHI Conference on Human Factors in Computing Systems (CHI'10)
-
-
Denning, T.1
Borning, A.2
Friedman, B.3
Gill, B.T.4
Kohno, T.5
Maisel, W.H.6
-
23
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
T. Denning, K. Fu, and T. Kohno, "Absence makes the heart grow fonder: New directions for implantable medical device security," in HotSec, 2008.
-
(2008)
HotSec
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
25
-
-
85092069836
-
Body area network security: Robust key establishment using human body channel
-
S. Chang, Y. C. Hu, H. Anderson, T. Fu, and E. Y. Huang, "Body area network security: Robust key establishment using human body channel," in Proc. of the USENIX conference on Health Security and Privacy, 2012.
-
(2012)
Proc. of the USENIX Conference on Health Security and Privacy
-
-
Chang, S.1
Hu, Y.C.2
Anderson, H.3
Fu, T.4
Huang, E.Y.5
-
26
-
-
0024605454
-
Pulse oximetry
-
K. K. Tremper, "Pulse oximetry," CHEST Journal, pp. 713-715, 1989.
-
(1989)
CHEST Journal
, pp. 713-715
-
-
Tremper, K.K.1
-
27
-
-
84879861042
-
Opfka: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks
-
H. Chunqiang, X. Cheng, F. Zhang, D. Wu, X. Liao, and D. Chen, "Opfka: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks," in IEEE INFOCOM Proc., 2013.
-
(2013)
IEEE INFOCOM Proc
-
-
Chunqiang, H.1
Cheng, X.2
Zhang, F.3
Wu, D.4
Liao, X.5
Chen, D.6
-
28
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: Non-invasive security for implantable medical devices," ACM SIGCOMM Computer Communication Review, vol. 41. 4, pp. 2-13, 2011.
-
(2011)
ACM SIGCOMM Computer Communication Review
, vol.41
, Issue.4
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
29
-
-
84881228641
-
On limitations of friendly jamming for confidentiality
-
N. O. Tippenhauer, L. Malisa, A. Ranganathan, and S. Capkun, "On limitations of friendly jamming for confidentiality," in IEEE Symp. on Security and Privacy, 2013.
-
(2013)
IEEE Symp. on Security and Privacy
-
-
Tippenhauer, N.O.1
Malisa, L.2
Ranganathan, A.3
Capkun, S.4
-
30
-
-
77957557705
-
Securing the communication of medical information using local biometric authentication and commercial wireless links
-
V. I. Ivanov, L. Y. Paul, and J. S. Baras, "Securing the communication of medical information using local biometric authentication and commercial wireless links," Health informatics journal, vol. 16. 3, pp. 211-223, 2010.
-
(2010)
Health Informatics Journal
, vol.16
, Issue.3
, pp. 211-223
-
-
Ivanov, V.I.1
Paul, L.Y.2
Baras, J.S.3
-
31
-
-
68049121093
-
Anomaly detection: A survey
-
V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys (CSUR), vol. 41. 3, p. 15, 2009.
-
(2009)
ACM Computing Surveys (CSUR)
, vol.41
, Issue.3
, pp. 15
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
32
-
-
84893849701
-
Medmon: Securing medical devices through wireless monitoring and anomaly detection
-
M. Zhang, A. Raghunathan, and N. K. Jha, "Medmon: Securing medical devices through wireless monitoring and anomaly detection," Biomedical Circuits and Systems, IEEE Transactions on, vol. 7. 6, pp. 871-881, 2013.
-
(2013)
Biomedical Circuits and Systems, IEEE Transactions on
, vol.7
, Issue.6
, pp. 871-881
-
-
Zhang, M.1
Raghunathan, A.2
Jha, N.K.3
-
33
-
-
77952576025
-
Fully wireless implantable cardiovascular pressure monitor integrated with a medical stent
-
E. Y. Chow, A. L. Chlebowski, S. Chakraborty, W. J. Chappell, and P. P. Irazoqui, "Fully wireless implantable cardiovascular pressure monitor integrated with a medical stent," Biomedical Engineering, IEEE Trans. on, vol. 57. 6, pp. 1487-1496, 2010.
-
(2010)
Biomedical Engineering, IEEE Trans. on
, vol.57
, Issue.6
, pp. 1487-1496
-
-
Chow, E.Y.1
Chlebowski, A.L.2
Chakraborty, S.3
Chappell, W.J.4
Irazoqui, P.P.5
|