-
2
-
-
84927658552
-
Security Considerations in the IP-based Internet of Things
-
July
-
Garcia-Morchon, O., Keoh, S., Kumar, S., Hummen, R., Struik, R.: Security Considerations in the IP-based Internet of Things, draft-garcia-core-security-02 (work in progress) (July 2011)
-
(2011)
Draft-Garcia-Core-Security-02 (Work in Progress)
-
-
Garcia-Morchon, O.1
Keoh, S.2
Kumar, S.3
Hummen, R.4
Struik, R.5
-
3
-
-
80053973692
-
Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
-
Healthcom 2011June
-
Li, C., Raghunathan, A., Jha, N.K.: Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In: Proceedings of the 13th IEEE International Conference on e-Health Networking, Applications, and Services, Healthcom 2011 (June 2011)
-
(2011)
Proceedings of the 13Th IEEE International Conference on E-Health Networking, Applications, and Services
-
-
Li, C.1
Raghunathan, A.2
Jha, N.K.3
-
5
-
-
36248934122
-
Survey of Wireless Indoor Positioning Techniques and Systems
-
Liu, H., Darabi, H., Banerjee, P., Liu, J.: Survey of Wireless Indoor Positioning Techniques and Systems. IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews) (2007)
-
(2007)
IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews)
-
-
Liu, H.1
Darabi, H.2
Banerjee, P.3
Liu, J.4
-
7
-
-
85092032703
-
Security that is Meant to be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices
-
Schechter, S.: Security that is Meant to be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices. In: USENIX Workshop on Health Security and Privacy (2010)
-
(2010)
USENIX Workshop on Health Security and Privacy
-
-
Schechter, S.1
-
8
-
-
78650216154
-
Medical data protection with a new generation of hardware authentication tokens
-
Pula, Croatia
-
Bergamasco, S., Bon, M., Inchingolo, P.: Medical data protection with a new generation of hardware authentication tokens. In: Mediterranean Conference on Medical and Biological Engineering and Computing (MEDICON), Pula, Croatia, pp. 82-85 (2001)
-
(2001)
Mediterranean Conference on Medical and Biological Engineering and Computing (MEDICON)
, pp. 82-85
-
-
Bergamasco, S.1
Bon, M.2
Inchingolo, P.3
-
9
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
ACM, New York
-
Rasmussen, K.B., Castelluccia, C., Heydt-Benjamin, T.S., Capkun, S.: Proximity-based access control for implantable medical devices. In: CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 410-419. ACM, New York (2009)
-
(2009)
CCS 2009: Proceedings of the 16Th ACM Conference on Computer and Communications Security
, pp. 410-419
-
-
Rasmussen, K.B.1
Castelluccia, C.2
Heydt-Benjamin, T.S.3
Capkun, S.4
-
10
-
-
50249098733
-
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
-
Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., Maisel, W.H.: Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In: IEEE Symposium on Security and Privacy (2008)
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
11
-
-
77953972283
-
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security
-
Denning, T., Fu, K., Kohno, T.: Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. In: HotSec (2008)
-
(2008)
Hotsec
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
12
-
-
80053135174
-
They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices
-
Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., Fu, K.: They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices. In: ACM SIGCOMM (2011)
-
(2011)
ACM SIGCOMM
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
13
-
-
79960873920
-
IMDGuard: Securing implantable medical devices with the external wearable guardian
-
April
-
Xu, F., Qin, Z., Tan, C.C., Wang, B., Li, Q.: IMDGuard: Securing implantable medical devices with the external wearable guardian. In: Proceedings of the 30th IEEE International Conference on Computer Communications, INFOCOM 2011, pp. 1862-1870 (April 2011)
-
(2011)
Proceedings of the 30Th IEEE International Conference on Computer Communications, INFOCOM 2011
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.C.3
Wang, B.4
Li, Q.5
-
14
-
-
84860267053
-
An amulet for trustworthy wearable mHealth
-
ACM, New York
-
Sorber, J., Shin, M., Peterson, R., Cornelius, C., Mare, S., Prasad, A., Marois, Z., Smithayer, E., Kotz, D.: An amulet for trustworthy wearable mHealth. In: Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications (HotMobile 2012). ACM, New York (2012)
-
(2012)
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications (Hotmobile 2012)
-
-
Sorber, J.1
Shin, M.2
Peterson, R.3
Cornelius, C.4
Mare, S.5
Prasad, A.6
Marois, Z.7
Smithayer, E.8
Kotz, D.9
-
15
-
-
79551649543
-
Defending resource depletion attacks on implantable medical devices
-
Hei, X., Du, X., Wu, J., Hu, F.: Defending resource depletion attacks on implantable medical devices. In: Proc. of the IEEE Globecom 2010, pp. 1-5 (2010)
-
(2010)
Proc. Of the IEEE Globecom 2010
, pp. 1-5
-
-
Hei, X.1
Du, X.2
Wu, J.3
Hu, F.4
-
16
-
-
84879868277
-
Balancing security and utility in medical devices?
-
Rostami, M., Burleson, W., Koushanfar, F., Juels, A.: Balancing security and utility in medical devices? In: Proc. of Automation Coference, pp. 1-6 (2013)
-
(2013)
Proc. Of Automation Coference
, pp. 1-6
-
-
Rostami, M.1
Burleson, W.2
Koushanfar, F.3
Juels, A.4
-
17
-
-
36949029788
-
Towards highly reliable enterprise network services via inference of multi-level dependencies
-
Bahl, P., Chandra, R., Greenberg, A., Kandula, S., Maltz, D., Zhang, M.: Towards highly reliable enterprise network services via inference of multi-level dependencies. In: Proc. of ACM SIGCOMM (2007)
-
(2007)
Proc. Of ACM SIGCOMM
-
-
Bahl, P.1
Chandra, R.2
Greenberg, A.3
Kandula, S.4
Maltz, D.5
Zhang, M.6
-
18
-
-
78650922110
-
Detailed diagnosis in enterprise networks
-
Kandula, S., Mahajan, R., Verkaik, P., Agarwal, S., Padhye, J., Bahl, P.: Detailed diagnosis in enterprise networks. In: Proc. of ACM SIGCOMM (2009)
-
(2009)
Proc. Of ACM SIGCOMM
-
-
Kandula, S.1
Mahajan, R.2
Verkaik, P.3
Agarwal, S.4
Padhye, J.5
Bahl, P.6
-
19
-
-
80053973692
-
Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
-
June
-
Li, C., Raghunathan, A., Jha, N.K.: Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In: Proc. IEEE Int. Conf. e-Health Networking, Applications and Services (June 2011)
-
(2011)
Proc. IEEE Int. Conf. E-Health Networking, Applications and Services
-
-
Li, C.1
Raghunathan, A.2
Jha, N.K.3
-
21
-
-
84856709903
-
Block cipher based security for severely resource-constrained implantable medical devices
-
ACMOctober
-
Beck, C., Masny, D., Geiselmann, W., Bretthauer, G.: Block cipher based security for severely resource-constrained implantable medical devices. In: Proceedings of 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL 2011, pp. 62:1-62:5. ACM (October 2011)
-
(2011)
Proceedings of 4Th International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL 2011
-
-
Beck, C.1
Masny, D.2
Geiselmann, W.3
Bretthauer, G.4
-
22
-
-
84893849701
-
MedMon: Securing medical devices through wireless monitoring and anomaly detection. IEEE Trans
-
Zhang, M., Raghunathan, A., Jha, N.K.: MedMon: Securing medical devices through wireless monitoring and anomaly detection. IEEE Trans. Biomedical Circuits and Systems (2013)
-
(2013)
Biomedical Circuits and Systems
-
-
Zhang, M.1
Raghunathan, A.2
Jha, N.K.3
|