-
1
-
-
40649108378
-
Wireless communication systems for implantable medical devices
-
Mar-Apr
-
D. Panescu, "Wireless communication systems for implantable medical devices," IEEE Engineering in Medicine and Biology Magazine, vol. 27, pp. 96-101, Mar-Apr 2008.
-
(2008)
IEEE Engineering in Medicine and Biology Magazine
, vol.27
, pp. 96-101
-
-
Panescu, D.1
-
2
-
-
77954020097
-
Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices
-
T. Denning, A. Borning, B. Friedman, B. T. Gill, T. Kohno, and W. H. Maisel, "Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices," CHI'2010: Proceedings of the 28th ACM Conference on Human Factors in Computing Systems, Vols 1-4, pp. 917-926, 2010.
-
(2010)
CHI'2010: Proceedings of the 28th ACM Conference on Human Factors in Computing Systems
, vol.1
, Issue.4
, pp. 917-926
-
-
Denning, T.1
Borning, A.2
Friedman, B.3
Gill, B.T.4
Kohno, T.5
Maisel, W.H.6
-
3
-
-
84864058685
-
Security and privacy qualities of medical devices: An analysis of fda postmarket surveillance
-
Jul 19
-
D. B. Kramer, M. Baker, B. Ransford, A. Molina-Markham, Q. Stewart, K. Fu, and M. R. Reynolds, "Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance," PLOS ONE, vol. 7, Jul 19 2012.
-
(2012)
PLOS ONE
, vol.7
-
-
Kramer, D.B.1
Baker, M.2
Ransford, B.3
Molina-Markham, A.4
Stewart, Q.5
Fu, K.6
Reynolds, M.R.7
-
4
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
D. Halperin, S. S. Clark, K. Fu, T. S. Heydt-Benjamin, B. Defend, T. Kohno, B. Ransford, W. Morgan, and W. H. Maisel, "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses," Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 129-142, 2008.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
Clark, S.S.2
Fu, K.3
Heydt-Benjamin, T.S.4
Defend, B.5
Kohno, T.6
Ransford, B.7
Morgan, W.8
Maisel, W.H.9
-
5
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
Aug
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices," Proceedings of the ACM SIGCOMM 2011 conference pp. 2-13, Aug 2011.
-
(2011)
Proceedings of the ACM SIGCOMM 2011 Conference
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
6
-
-
84863537000
-
Design challenges for secure implantable medical devices
-
W. Burleson, S. S. Clark, B. Ransford, and K. Fu, "Design Challenges for Secure Implantable Medical Devices," 2012 49th ACM/EDAC/IEEE Design Automation Conference (Dac), pp. 12-17, 2012.
-
(2012)
2012 49th ACM/EDAC/IEEE Design Automation Conference (Dac)
, pp. 12-17
-
-
Burleson, W.1
Clark, S.S.2
Ransford, B.3
Fu, K.4
-
7
-
-
38349178199
-
Security and privacy for implantable medical devices
-
Jan-Mar
-
D. Halperin, T. Kohno, T. S. Heydt-Benjamin, K. Fu, and W. H. Maisel, "Security and privacy for implantable medical devices," IEEE Pervasive Computing, vol. 7, pp. 30-39, Jan-Mar 2008.
-
(2008)
IEEE Pervasive Computing
, vol.7
, pp. 30-39
-
-
Halperin, D.1
Kohno, T.2
Heydt-Benjamin, T.S.3
Fu, K.4
Maisel, W.H.5
-
8
-
-
84922847589
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
USENIX Association, Berkeley CA, USA
-
K. F. Tamara Denning, and Tadayoshi Kohno, "Absence makes the heart grow fonder: new directions for implantable medical device security," Proceedings of the 3rd conference on Hot topics in security (HOTSEC' 08), USENIX Association, Berkeley CA, USA, vol. Article 5, 7 pages, 2008.
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security (HOTSEC' 08)
-
-
Tamara Denning, K.F.1
Kohno, T.2
-
9
-
-
79959306732
-
Secret-sharing schemes: A survey
-
Y. Chee, Z. Guo, S. Ling, F. Shao, Y. Tang, H. Wang, and C. Xing, Eds., ed: Springer Berlin Heidelberg
-
A. Beimel, "Secret-Sharing Schemes: A Survey," in Coding and Cryptology. vol. 6639, Y. Chee, Z. Guo, S. Ling, F. Shao, Y. Tang, H. Wang, and C. Xing, Eds., ed: Springer Berlin Heidelberg, 2011, pp. 11-46.
-
(2011)
Coding and Cryptology
, vol.6639
, pp. 11-46
-
-
Beimel, A.1
-
10
-
-
14844283547
-
Physiobank, physiotoolkit, and physionet-components of a new research resource for complex physiologic signals
-
Jun 13
-
A. L. Goldberger, L. A. N. Amaral, L. Glass, J. M. Hausdorff, P. C. Ivanov, R. G. Mark, J. E. Mietus, G. B. Moody, C. K. Peng, and H. E. Stanley, "PhysioBank, PhysioToolkit, and PhysioNet-Components of a new research resource for complex physiologic signals," Circulation, vol. 101, pp. E215-E220, Jun 13 2000.
-
(2000)
Circulation
, vol.101
, pp. E215-E220
-
-
Goldberger, A.L.1
Amaral, L.A.N.2
Glass, L.3
Hausdorff, J.M.4
Ivanov, P.C.5
Mark, R.G.6
Mietus, J.E.7
Moody, G.B.8
Peng, C.K.9
Stanley, H.E.10
-
11
-
-
80053973692
-
Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
-
C. Li, A. Raghunathan, and N. K. Jha, "Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system," in 13th IEEE International Conference on e-Health Networking Applications and Services (Healthcom), 2011, pp. 150-156.
-
(2011)
13th IEEE International Conference on E-Health Networking Applications and Services (Healthcom)
, pp. 150-156
-
-
Li, C.1
Raghunathan, A.2
Jha, N.K.3
-
12
-
-
84940750714
-
-
15 March
-
"Medtronic Company Website. http://www. medtronic. com/index. htm," 15 March 2013.
-
(2013)
Medtronic Company Website
-
-
-
13
-
-
77956045650
-
Researchers fight to keep implanted medical devices safe from hackers
-
Aug
-
N. Leavitt, "Researchers Fight to Keep Implanted Medical Devices Safe from Hackers," Computer, vol. 43, pp. 11-14, Aug 2010.
-
(2010)
Computer
, vol.43
, pp. 11-14
-
-
Leavitt, N.1
-
14
-
-
68949178835
-
Securing wireless implantable devices for healthcare: Ideas and challenges
-
Jul
-
K. Malasri and L. Wang, "Securing Wireless Implantable Devices for Healthcare: Ideas and Challenges," IEEE Communications Magazine, vol. 47, pp. 74-80, Jul 2009.
-
(2009)
IEEE Communications Magazine
, vol.47
, pp. 74-80
-
-
Malasri, K.1
Wang, L.2
-
15
-
-
79960873920
-
IMDGuard: Securing implantable medical devices with the external wearable guardian
-
F. Y. Xu, Z. R. Qin, C. C. Tan, B. S. Wang, and Q. Li, "IMDGuard: Securing Implantable Medical Devices with the External Wearable Guardian," Proceedings of the 2011 IEEE INFOCOM, pp. 1862-1870, 2011.
-
(2011)
Proceedings of the 2011 IEEE INFOCOM
, pp. 1862-1870
-
-
Xu, F.Y.1
Qin, Z.R.2
Tan, C.C.3
Wang, B.S.4
Li, Q.5
-
16
-
-
79960856885
-
Biometric-based two-level secure access control for implantable medical devices during emergencies
-
X. L. Hei and X. J. Du, "Biometric-based Two-level Secure Access Control for Implantable Medical Devices during Emergencies," Proceedings of the 2011 IEEE INFOCOM, pp. 346-350, 2011.
-
(2011)
Proceedings of the 2011 IEEE INFOCOM
, pp. 346-350
-
-
Hei, X.L.1
Du, X.J.2
-
17
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
K. B. Rasmussen, C. Castelluccia, T. Heydt-Benjamin, and S. Capkun, "Proximity-based Access Control for Implantable Medical Devices," CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 410-419, 2009.
-
(2009)
CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 410-419
-
-
Rasmussen, K.B.1
Castelluccia, C.2
Heydt-Benjamin, T.3
Capkun, S.4
-
18
-
-
84939435969
-
BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, "BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," 2003 International Conference on Parallel Processing Workshops, Proceedings, pp. 432-439, 2003.
-
(2003)
2003 International Conference on Parallel Processing Workshops, Proceedings
, pp. 432-439
-
-
Cherukuri, S.1
Venkatasubramanian, K.K.2
Gupta, S.K.S.3
-
21
-
-
51049107527
-
EKG-based key agreement in body sensor networks
-
K. K. Venkatasubramanian, Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "EKG-based key agreement in Body Sensor Networks," in IEEE INFOCOM Workshops 2008, 2008, pp. 1-6.
-
(2008)
IEEE INFOCOM Workshops
, vol.2008
, pp. 1-6
-
-
Venkatasubramanian, K.K.1
Venkatasubramanian2
Banerjee, A.3
Gupta, S.K.S.4
-
22
-
-
84870926798
-
ECG-Cryptography and authentication in body area networks
-
Jun 26
-
Z. Zhang, H. Wang, A. Vasilakos, and H. Feng, "ECG-Cryptography and Authentication in Body Area Networks," IEEE Trans. Information Technology in Biomedicine, vol. 16, p. 9, Jun 26 2012.
-
(2012)
IEEE Trans. Information Technology in Biomedicine
, vol.16
, pp. 9
-
-
Zhang, Z.1
Wang, H.2
Vasilakos, A.3
Feng, H.4
-
23
-
-
76849098534
-
PSKA: Usable and secure key agreement scheme for body area networks
-
Jan
-
K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks," IEEE Transactions on Information Technology in Biomedicine, vol. 14, pp. 60-68, Jan 2010.
-
(2010)
IEEE Transactions on Information Technology in Biomedicine
, vol.14
, pp. 60-68
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.K.S.3
-
24
-
-
84940644968
-
A mathematical theory of communication
-
623-656, July, October
-
C. E. SHANNON, "A mathematical theory of communication.," The Bell System Technical Journal, vol. 27, pp. 379-423, 623-656, July, October, 1948.
-
(1948)
The Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
25
-
-
82055176933
-
Electrocardiogram (ECG) biometric authentication using pulse active ratio (PAR)
-
Dec
-
S. I. Safie, J. J. Soraghan, and L. Petropoulakis, "Electrocardiogram (ECG) Biometric Authentication Using Pulse Active Ratio (PAR)," IEEE Transactions on Information Forensics and Security, vol. 6, pp. 1315-1322, Dec 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, pp. 1315-1322
-
-
Safie, S.I.1
Soraghan, J.J.2
Petropoulakis, L.3
|