-
1
-
-
80053973692
-
Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
-
Jun.
-
C. Li, A. Raghunathan, and N. K. Jha, "Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system," in Proc. 13th IEEE Int. Conf. e-Health Netw. Appl. Services (Healthcom), Jun. 2011, pp. 150-156.
-
(2011)
Proc. 13th IEEE Int. Conf. E-Health Netw. Appl. Services (Healthcom)
, pp. 150-156
-
-
Li, C.1
Raghunathan, A.2
Jha, N.K.3
-
2
-
-
38349178199
-
Security and privacy for implantable medical devices
-
Jan./Mar.
-
D. Halperin, T. Kohno, T. S. Heydt-Benjamin, K. Fu, and W. H. Maisel, "Security and privacy for implantable medical devices," IEEE Pervasive Comput., vol. 7, no. 1, pp. 30-39, Jan./Mar. 2008.
-
(2008)
IEEE Pervasive Comput.
, vol.7
, Issue.1
, pp. 30-39
-
-
Halperin, D.1
Kohno, T.2
Heydt-Benjamin, T.S.3
Fu, K.4
Maisel, W.H.5
-
3
-
-
84907005557
-
A non-key based security scheme supporting emergency treatment of wireless implants
-
Jun.
-
G. Zheng, G. Fang, M. A. Orgun, and R. Shankaran, "A non-key based security scheme supporting emergency treatment of wireless implants," in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2014, pp. 647-652.
-
(2014)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 647-652
-
-
Zheng, G.1
Fang, G.2
Orgun, M.A.3
Shankaran, R.4
-
4
-
-
84925324251
-
Security mechanism based on hospital authentication server for secure application of implantable medical devices
-
Jul.
-
C.-S. Park, "Security mechanism based on hospital authentication server for secure application of implantable medical devices," BioMed Res. Int., vol. 2014, Jul. 2014, Art. ID 543051.
-
(2014)
BioMed Res. Int.
, vol.2014
-
-
Park, C.-S.1
-
5
-
-
84898467088
-
Securing access to next generation IP-enabled pacemakers and ICDs using Ladon
-
J. Astorga, J. C. Astorga, E. Jacob, N. Toledo, and M. Higuero, "Securing access to next generation IP-enabled pacemakers and ICDs using Ladon," J. Ambient Intell. Smart Environ., vol. 6, no. 2, pp. 157-177, 2014.
-
(2014)
J. Ambient Intell. Smart Environ.
, vol.6
, Issue.2
, pp. 157-177
-
-
Astorga, J.1
Astorga, J.C.2
Jacob, E.3
Toledo, N.4
Higuero, M.5
-
6
-
-
79957516511
-
A lightweight security protocol for ultra-low power ASIC implementation for wireless implantable medical devices
-
Mar.
-
S. Hosseini-Khayat, "A lightweight security protocol for ultra-low power ASIC implementation for wireless implantable medical devices," in Proc. 5th Int. Symp. Med. Inf. Commun. Technol. (ISMICT), Mar. 2011, pp. 6-9.
-
(2011)
Proc. 5th Int. Symp. Med. Inf. Commun. Technol. (ISMICT)
, pp. 6-9
-
-
Hosseini-Khayat, S.1
-
7
-
-
84888991169
-
Securing implantable cardiac medical devices: Use of radio frequency energy harvesting
-
N. Ellouze, M. Allouche, H. Ben Ahmed, S. Rekhis, and N. Boudriga, "Securing implantable cardiac medical devices: Use of radio frequency energy harvesting," in Proc. 3rd Int. Workshop Trustworthy Embedded Devices, 2013, pp. 35-42.
-
(2013)
Proc. 3rd Int. Workshop Trustworthy Embedded Devices
, pp. 35-42
-
-
Ellouze, N.1
Allouche, M.2
Ben Ahmed, H.3
Rekhis, S.4
Boudriga, N.5
-
8
-
-
50249098733
-
Pacemakers and implantable cardiac deffbrillators: Software radio attacks and zero-power defenses
-
May
-
D. Halperin et al., "Pacemakers and implantable cardiac deffbrillators: Software radio attacks and zero-power defenses," in Proc. IEEE Symp. Security Privacy, May 2008, pp. 129-142.
-
(2008)
Proc. IEEE Symp. Security Privacy
, pp. 129-142
-
-
Halperin, D.1
-
9
-
-
85025393425
-
A system architecture, processor, and communication protocol for secure implants
-
C. Strydis, R. M. Seepers, P. Peris-Lopez, D. Siskos, and I. Sourdis, "A system architecture, processor, and communication protocol for secure implants," ACM Trans. Archit. Code Optim. (TACO), vol. 10, no. 4, 2013, Art. ID 57.
-
(2013)
ACM Trans. Archit. Code Optim. (TACO)
, vol.10
, Issue.4
-
-
Strydis, C.1
Seepers, R.M.2
Peris-Lopez, P.3
Siskos, D.4
Sourdis, I.5
-
10
-
-
79960873920
-
IMDGuard: Securing implantable medical devices with the external wearable guardian
-
Apr.
-
F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li, "IMDGuard: Securing implantable medical devices with the external wearable guardian," in Proc. IEEE INFOCOM, Apr. 2011, pp. 1862-1870.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.C.3
Wang, B.4
Li, Q.5
-
11
-
-
79960856885
-
Biometric-based two-level secure access control for implantable medical devices during emergencies
-
Apr.
-
X. Hei and X. Du, "Biometric-based two-level secure access control for implantable medical devices during emergencies," in Proc. IEEE INFOCOM, Apr. 2011, pp. 346-350.
-
(2011)
Proc. IEEE INFOCOM
, pp. 346-350
-
-
Hei, X.1
Du, X.2
-
12
-
-
84888984313
-
Heart-to-heart (H2H): Authentication for implanted medical devices
-
M. Rostami, A. Juels, and F. Koushanfar, "Heart-to-heart (H2H): Authentication for implanted medical devices," in Proc. ACM SIGSAC Conf. Comput. Commun. Security (CCS), 2013, pp. 1099-1112.
-
(2013)
Proc. ACM SIGSAC Conf. Comput. Commun. Security (CCS)
, pp. 1099-1112
-
-
Rostami, M.1
Juels, A.2
Koushanfar, F.3
-
13
-
-
84940751678
-
An ECG-based secret data sharing scheme supporting emergency treatment of implantable medical devices
-
Sep.
-
G. Zheng, G. Fang, R. Shankaran, M. Orgun, and E. Dutkiewicz, "An ECG-based secret data sharing scheme supporting emergency treatment of implantable medical devices," in Proc. Int. Symp. Wireless Personal Multimedia Commun. (WPMC), Sep. 2014, pp. 624-628.
-
(2014)
Proc. Int. Symp. Wireless Personal Multimedia Commun. (WPMC)
, pp. 624-628
-
-
Zheng, G.1
Fang, G.2
Shankaran, R.3
Orgun, M.4
Dutkiewicz, E.5
-
14
-
-
84922904522
-
Securing wireless medical implants using an ECG-based secret data sharing scheme
-
Sep.
-
G. Zheng, G. Fang, M. A. Orgun, R. Shankaran, and E. Dutkiewicz, "Securing wireless medical implants using an ECG-based secret data sharing scheme," in Proc. 14th Int. Symp. Commun. Inf. Technol. (ISCIT), Sep. 2014, pp. 373-377.
-
(2014)
Proc. 14th Int. Symp. Commun. Inf. Technol. (ISCIT)
, pp. 373-377
-
-
Zheng, G.1
Fang, G.2
Orgun, M.A.3
Shankaran, R.4
Dutkiewicz, E.5
-
15
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun, "Proximity-based access control for implantable medical devices," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 410-419.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 410-419
-
-
Rasmussen, K.B.1
Castelluccia, C.2
Heydt-Benjamin, T.S.3
Capkun, S.4
-
16
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
17
-
-
3042776200
-
Secure direct communication with a quantum one-time pad
-
F.-G. Deng and G. L. Long, "Secure direct communication with a quantum one-time pad," Phys. Rev. A, vol. 69, no. 5, p. 052319, 2004.
-
(2004)
Phys. Rev. A
, vol.69
, Issue.5
, pp. 052319
-
-
Deng, F.-G.1
Long, G.L.2
-
18
-
-
84959858437
-
-
U.S. Patent Feb.
-
R. Horstmeyer, B. Judkewitz, C. Yang, and I. M. Vellekoop, "Physical keyprotected one time pad," U.S. Patent 2013 0 243 187, Feb. 21, 2013.
-
(2013)
Physical Keyprotected One Time Pad
, pp. 21
-
-
Horstmeyer, R.1
Judkewitz, B.2
Yang, C.3
Vellekoop, I.M.4
-
19
-
-
84879861042
-
OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks
-
Apr.
-
C. Hu, X. Cheng, F. Zhang, D. Wu, X. Liao, and D. Chen, "OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks," in Proc. IEEE INFOCOM, Apr. 2013, pp. 2274-2282.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2274-2282
-
-
Hu, C.1
Cheng, X.2
Zhang, F.3
Wu, D.4
Liao, X.5
Chen, D.6
-
20
-
-
84870926798
-
ECG-cryptography and authentication in body area networks
-
Nov.
-
Z. Zhang, H.Wang, A. V. Vasilakos, and H. Fang, "ECG-cryptography and authentication in body area networks," IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 6, pp. 1070-1078, Nov. 2012.
-
(2012)
IEEE Trans. Inf. Technol. Biomed.
, vol.16
, Issue.6
, pp. 1070-1078
-
-
Zhang, Z.1
Wang, H.2
Vasilakos, A.V.3
Fang, H.4
-
21
-
-
76849098534
-
PSKA: Usable and secure key agreement scheme for body area networks
-
Jan.
-
K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "PSKA: Usable and secure key agreement scheme for body area networks," IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 1, pp. 60-68, Jan. 2010.
-
(2010)
IEEE Trans. Inf. Technol. Biomed.
, vol.14
, Issue.1
, pp. 60-68
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.K.S.3
-
22
-
-
51049107527
-
EKGbased key agreement in body sensor networks
-
Apr.
-
K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "EKGbased key agreement in body sensor networks," in Proc. IEEE INFOCOM Workshops, Apr. 2008, pp. 1-6.
-
(2008)
Proc. IEEE INFOCOM Workshops
, pp. 1-6
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.K.S.3
-
23
-
-
84863537000
-
Design challenges for secure implantable medical devices
-
Jun.
-
W. Burleson, S. S. Clark, B. Ransford, and K. Fu, "Design challenges for secure implantable medical devices," in Proc. 49th Annu. Design Autom. Conf., Jun. 2012, pp. 12-17.
-
(2012)
Proc. 49th Annu. Design Autom. Conf.
, pp. 12-17
-
-
Burleson, W.1
Clark, S.S.2
Ransford, B.3
Fu, K.4
-
24
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: Non-invasive security for implantable medical devices," ACM SIGCOMM Comput. Commun. Rev., vol. 41, no. 4, pp. 2-13, 2011.
-
(2011)
ACM SIGCOMM Comput. Commun. Rev.
, vol.41
, Issue.4
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
25
-
-
12144285744
-
A wavelet-based ECG delineator: Evaluation on standard databases
-
Apr.
-
J. P. Martínez, R. Almeida, S. Olmos, A. P. Rocha, and P. Laguna, "A wavelet-based ECG delineator: Evaluation on standard databases," IEEE Trans. Biomed. Eng., vol. 51, no. 4, pp. 570-581, Apr. 2004.
-
(2004)
IEEE Trans. Biomed. Eng.
, vol.51
, Issue.4
, pp. 570-581
-
-
Martínez, J.P.1
Almeida, R.2
Olmos, S.3
Rocha, A.P.4
Laguna, P.5
-
27
-
-
30844458593
-
Afuzzy vault scheme
-
A. Juels and M. Sudan, "Afuzzy vault scheme," Designs, Codes Cryptogr., vol. 38, no. 2, pp. 237-257, 2006.
-
(2006)
Designs, Codes Cryptogr.
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
29
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Germany: Springer-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryp-tology. Berlin, Germany: Springer-Verlag, 2004, pp. 523-540.
-
(2004)
Advances in Cryp-tology. Berlin
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
30
-
-
50549175697
-
On a class of error correcting binary group codes
-
R. C. Bose and D. K. Ray-Chaudhuri, "On a class of error correcting binary group codes," Inf. Control, vol. 3, no. 1, pp. 68-79, 1960.
-
(1960)
Inf. Control
, vol.3
, Issue.1
, pp. 68-79
-
-
Bose, R.C.1
Ray-Chaudhuri, D.K.2
-
31
-
-
56649112965
-
Using the timing information of heartbeats as an entity identifier to secure body sensor network
-
Nov.
-
S.-D. Bao, C. C. Y. Poon, Y.-T. Zhang, and L.-F. Shen, "Using the timing information of heartbeats as an entity identifier to secure body sensor network," IEEE Trans. Inf. Technol. Biomed., vol. 12, no. 6, pp. 772-779, Nov. 2008.
-
(2008)
IEEE Trans. Inf. Technol. Biomed.
, vol.12
, Issue.6
, pp. 772-779
-
-
Bao, S.-D.1
Poon, C.C.Y.2
Zhang, Y.-T.3
Shen, L.-F.4
-
32
-
-
51249105030
-
IEEE 1588 standard for a precision clock synchronization protocol for networked measurement and control systems
-
Nov.
-
J. Eidson and K. Lee, "IEEE 1588 standard for a precision clock synchronization protocol for networked measurement and control systems," in Proc. 2nd ISA/IEEE Sensors Ind. Conf., Nov. 2002, pp. 98-105.
-
(2002)
Proc. 2nd ISA/IEEE Sensors Ind. Conf.
, pp. 98-105
-
-
Eidson, J.1
Lee, K.2
-
33
-
-
14844283547
-
PhysioBank, physioToolkit, and physioNet: Components of a new research resource for complex physiologic signals
-
A. L. Goldberger et al., "PhysioBank, physioToolkit, and physioNet: Components of a new research resource for complex physiologic signals," Circulation, vol. 101, no. 23, pp. e215-e220, 2000.
-
(2000)
Circulation
, vol.101
, Issue.23
, pp. e215-e220
-
-
Goldberger, A.L.1
-
34
-
-
0026705255
-
The European ST-T database: Standard for evaluating systems for the analysis of ST-T changes in ambulatory electrocardiography
-
A. Taddei et al., "The European ST-T database: Standard for evaluating systems for the analysis of ST-T changes in ambulatory electrocardiography," Eur. Heart J., vol. 13, no. 9, pp. 1164-1172, 1992.
-
(1992)
Eur. Heart J.
, vol.13
, Issue.9
, pp. 1164-1172
-
-
Taddei, A.1
-
35
-
-
84880100511
-
SP 800-22 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications
-
Gaithersburg, MD, USA
-
L. Bassham et al., "SP 800-22 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications," Nat. Inst. Standards Technol., Gaithersburg, MD, USA, 2010.
-
(2010)
Nat. Inst. Standards Technol.
-
-
Bassham, L.1
-
36
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Mar.
-
A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proc. 3rd IEEE Int. Conf. Pervasive Comput. Commun. (PerCom), Mar. 2005, pp. 324-328.
-
(2005)
Proc. 3rd IEEE Int. Conf. Pervasive Comput. Commun. (PerCom)
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
|