-
1
-
-
57049172592
-
Security protocols, properties, and their monitoring
-
ACM, New York, NY
-
Bauer, A. and Juerjens, J. 2008. Security protocols, properties, and their monitoring. In Proceedings of the 4th International Workshop on Software Engineering for Secure Systems (SESS'08). ACM, New York, NY, 33-40.
-
(2008)
Proceedings of the 4th International Workshop on Software Engineering for Secure Systems (SESS'08).
, pp. 33-40
-
-
Bauer, A.1
Juerjens, J.2
-
2
-
-
84856709903
-
Block cipher based security for severely resource-constrained implantable medical devices
-
Beck, C., Masny, D., Geiselmann, W., and Bretthauer, G. 2011. Block cipher based security for severely resource-constrained implantable medical devices. In Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies. ACM, 62.
-
(2011)
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies. ACM
, pp. 62
-
-
Beck, C.1
Masny, D.2
Geiselmann, W.3
Bretthauer, G.4
-
3
-
-
84867161676
-
An analysis of security weaknesses in the evolution of RFID enabled passport
-
Bogari, E. A., Zavarsky, P., Lindskog, D., and Ruhl, R. 2012. An analysis of security weaknesses in the evolution of RFID enabled passport. In Proceedings of the 2012 World Congress on Internet Security (WorldCIS'12). 158-166.
-
(2012)
Proceedings of the 2012 World Congress on Internet Security (WorldCIS'12).
, pp. 158-166
-
-
Bogari, E.A.1
Zavarsky, P.2
Lindskog, D.3
Ruhl, R.4
-
4
-
-
1442292337
-
Protocols for authentication and key establishment
-
3rd Ed. Springer Publishing Company, Incorporated
-
Boyd, C. and Mathuria, A. 2010. Protocols for authentication and key establishment. In Information Security and Cryptography 3rd Ed. Springer Publishing Company, Incorporated.
-
(2010)
Information Security and Cryptography
-
-
Boyd, C.1
Mathuria, A.2
-
5
-
-
4143130875
-
Energy efficient security protocol for wireless sensor networks
-
IEEE
-
Cam, H., Ozdemir, S., Muthuavinashiappan, D., and Nair, P. 2003. Energy efficient security protocol for wireless sensor networks. In Proceedings of the Vehicular Technology Conference. Vol. 5. IEEE, 2981-2984.
-
(2003)
Proceedings of the Vehicular Technology Conference.
, vol.5
, pp. 2981-2984
-
-
Cam, H.1
Ozdemir, S.2
Muthuavinashiappan, D.3
Nair, P.4
-
6
-
-
84868335627
-
Distance hijacking attacks on distance bounding protocols
-
Cremers, C., Rasmussen, K. B., Schmidt, B., and Capkun, S. 2012. Distance hijacking attacks on distance bounding protocols. In Proceedings of the IEEE Symposium on Security and Privacy (SP'12). 113-127.
-
(2012)
Proceedings of the IEEE Symposium on Security and Privacy (SP'12).
, pp. 113-127
-
-
Cremers, C.1
Rasmussen, K.B.2
Schmidt, B.3
Capkun, S.4
-
7
-
-
0031808307
-
Acute effects on insulin sensitivity and diurnal metabolic profiles of a high-sucrose compared with a high-starch diet
-
Daly, M. E., Vale, C., Walker, M., Littlefield, A., Alberti, K., and Mathers, J. C. 1998. Acute effects on insulin sensitivity and diurnal metabolic profiles of a high-sucrose compared with a high-starch diet. American Journal of Clinical Nutrition 67, 6, 1186-1196.
-
(1998)
American Journal of Clinical Nutrition
, vol.67
, pp. 1186-1196
-
-
Daly, M.E.1
Vale, C.2
Walker, M.3
Littlefield, A.4
Alberti, K.5
Mathers, J.C.6
-
9
-
-
77954020097
-
Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices
-
Denning, T., Borning, A., Friedman, B., Gill, B. T., Kohno, T., and Maisel, W. H. 2010. Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proceedings of the 28th International Conference on Human Factors in Computing Systems. 917-926.
-
(2010)
Proceedings of the 28th International Conference on Human Factors in Computing Systems.
, pp. 917-926
-
-
Denning, T.1
Borning, A.2
Friedman, B.3
Gill, B.T.4
Kohno, T.5
Maisel, W.H.6
-
10
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
USENIX Association
-
Denning, T, Fu, K., and Kohno, T. 2008. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proceedings of the 3rd Conference on Hot Topics in Security. USENIX Association, 5:1-5:7.
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security.
, vol.5
, Issue.7
, pp. 1-5
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
11
-
-
65649101592
-
-
Class-1 Generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz (version 1.2.0)
-
Epcglobal Inc. 2008. Class-1 Generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz (version 1.2.0).
-
(2008)
Epcglobal Inc.
-
-
-
12
-
-
85025381566
-
-
FCC. FCC 47CFR95.601-95.673 Subpart E/I. Rules for MedRadio Services
-
FCC. 2003. MICS Medical Implant Communication Services. FCC 47CFR95.601-95.673 Subpart E/I. Rules for MedRadio Services.
-
(2003)
MICS Medical Implant Communication Services.
-
-
-
13
-
-
0026117424
-
A microprocessor-based implantable telemetry system
-
Fernald, K., Cook, T., Iii, T. M., and Paulos, J. 1991. A microprocessor-based implantable telemetry system. IEEE Computer 24, 23-30.
-
(1991)
IEEE Computer
, vol.24
, pp. 23-30
-
-
Fernald, K.1
Cook, T.2
Iii, T.M.3
Paulos, J.4
-
15
-
-
84892454478
-
They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices
-
Retrieved December 2, 2013 from http://groups.csail.mit.edu/netmit/imdshield/paper.pdf
-
Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., and Fu, K. 2011. They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices. Retrieved December 2, 2013 from http://groups.csail.mit.edu/netmit/imdshield/paper.pdf.
-
(2011)
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
17
-
-
38349178199
-
Security and privacy for implantable medical devices
-
Halperin, D., Heydt-Benjamin, T. S., Fu, K., Kohno, T., and Maisel, W. H. 2008. Security and privacy for implantable medical devices. IEEE Pervasive Computing 7, 30-39.
-
(2008)
IEEE Pervasive Computing
, vol.7
, pp. 30-39
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Fu, K.3
Kohno, T.4
Maisel, W.H.5
-
18
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
IEEE Computer Society
-
Halperin, D., Heydt-Benjamin, T. S., Ransford, B., Clark, S. S., Defend, B., Morgan, W., Fu, K., Kohno, T., and Maisel, W. H. 2008. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the 2008 IEEE Symposium on Security and Privacy. IEEE Computer Society, 129-142.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy.
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
20
-
-
84943520337
-
Defending resource depletion attacks on implantable medical devices
-
Globecom
-
Hei, X., Du, X., Wu, J., and Hu, F. 2010. Defending resource depletion attacks on implantable medical devices. In Globecom. IEEE, 1-5.
-
(2010)
IEEE
, pp. 1-5
-
-
Hei, X.1
Du, X.2
Wu, J.3
Hu, F.4
-
22
-
-
85025415194
-
Information technology-Security techniques-Entity authentication-Part 2: Mechanisms using symmetric encipherment algorithms
-
ISO. 2008 International Standard
-
ISO. 1999. Information technology-Security techniques-Entity authentication-Part 2: Mechanisms using symmetric encipherment algorithms, ISO/IEC 2-9798: 2008. International Standard.
-
(1999)
ISO/IEC
, pp. 2-9798
-
-
-
23
-
-
84892459814
-
Design of an implantable multichannel neurostimulator for restoring impaired gastrointestinal motility
-
Jalilian, E., Turner, L., Jullien, G., and Mitchev, M. 2004. Design of an implantable multichannel neurostimulator for restoring impaired gastrointestinal motility. In Proceedings of the 9th Annual Conference of the International FES Society.
-
(2004)
Proceedings of the 9th Annual Conference of the International FES Society.
-
-
Jalilian, E.1
Turner, L.2
Jullien, G.3
Mitchev, M.4
-
25
-
-
77958150562
-
Wireless sensor networks for healthcare
-
Ko, J., Lu, C., Srivastava, M. B., Stankovic, J. A., Terzis, A., and Welsh, M. 2010. Wireless sensor networks for healthcare. Proceedings of the IEEE 98, 11, 1947-1960.
-
(2010)
Proceedings of the IEEE
, vol.98
, pp. 1947-1960
-
-
Ko, J.1
Lu, C.2
Srivastava, M.B.3
Stankovic, J.A.4
Terzis, A.5
Welsh, M.6
-
26
-
-
77956045650
-
Researchers Fight to Keep Implanted Medical Devices Safe from Hackers
-
Leavitt, N. 2010. Researchers Fight to Keep Implanted Medical Devices Safe from Hackers. Computer 43,11-14.
-
(2010)
Computer
, vol.43
, pp. 11-14
-
-
Leavitt, N.1
-
27
-
-
78049298573
-
The price of security in wireless sensor networks
-
Lee, J., Kapitanova, K., and Son, S. H. 2010. The price of security in wireless sensor networks. Computer Networks 54, 17, 2967-2978.
-
(2010)
Computer Networks
, vol.54
, pp. 2967-2978
-
-
Lee, J.1
Kapitanova, K.2
Son, S.H.3
-
30
-
-
29144526751
-
A second-generation sensor network processor with application-driven memory optimizations and out-of-order execution
-
ACM
-
Nazhandali, L., Minuth, M., Zhai, B., Olson, J., Austin, T., and Blaauw, D. 2005. A second-generation sensor network processor with application-driven memory optimizations and out-of-order execution. In Proceedings of the 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems. ACM, 249-256.
-
(2005)
Proceedings of the 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems.
, pp. 249-256
-
-
Nazhandali, L.1
Minuth, M.2
Zhai, B.3
Olson, J.4
Austin, T.5
Blaauw, D.6
-
33
-
-
20344371167
-
A description of the misty1 encryption algorithm
-
November
-
Ohta, H. and Matsui, M. 2000. A description of the misty1 encryption algorithm. RFC2994, November.
-
(2000)
RFC2994
-
-
Ohta, H.1
Matsui, M.2
-
34
-
-
79961134633
-
Energy harvesting and remote powering for implantable biosensors
-
Olivo, J., Carrara, S., and De Micheli, G. 2011. Energy harvesting and remote powering for implantable biosensors. IEEE Sensors Journal 11, 7, 1573-1586.
-
(2011)
IEEE Sensors Journal
, vol.11
, pp. 1573-1586
-
-
Olivo, J.1
Carrara, S.2
De Micheli, G.3
-
35
-
-
84855654230
-
Vhdl implementation of the biosTator ii glucose control algorithm for critical care
-
Pagkalos, I., Herrero, P., El-Sharkawy, M., Pesl, P., OLIVER, N., and GEORGIOU, P. 2011. Vhdl implementation of the biosTator ii glucose control algorithm for critical care. In Proceedings of the Biomedical Circuits and Systems Conference (BioCAS'11). IEEE, 94-97.
-
(2011)
Proceedings of the Biomedical Circuits and Systems Conference (BioCAS'11). IEEE
, pp. 94-97
-
-
Pagkalos, I.1
Herrero, P.2
El-Sharkawy, M.3
Pesl, P.4
OLIVER, N.5
GEORGIOU, P.6
-
36
-
-
1142275612
-
A low-cost memory architecture with nand xip for mobile embedded systems
-
ACM
-
Park, C., Seo, J., Bae, S., Kim, H., Kim, S., and Kim, B. 2003. A low-cost memory architecture with nand xip for mobile embedded systems. In Proceedings of the 1st IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis. ACM, 138-143.
-
(2003)
Proceedings of the 1st IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis
, pp. 138-143
-
-
Park, C.1
Seo, J.2
Bae, S.3
Kim, H.4
Kim, S.5
Kim, B.6
-
37
-
-
70350212750
-
Hackers Assault Epilepsy Patients via Computer
-
Retrieved from www.wired.com/ politics/security/news/2008/03/epilepsy
-
Poulson, K. 2008. Hackers Assault Epilepsy Patients via Computer. Retrieved from www.wired.com/ politics/security/news/2008/03/epilepsy.
-
(2008)
-
-
Poulson, K.1
-
39
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
ACM
-
Rasmussen, K. B., Castelluccia, C., Heydt-Benjamin, T. S., and Capkun, S. 2009. Proximity-based access control for implantable medical devices. In Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, 410-419.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security.
, pp. 410-419
-
-
Rasmussen, K.B.1
Castelluccia, C.2
Heydt-Benjamin, T.S.3
Capkun, S.4
-
40
-
-
33144472952
-
RFID Guardian: A battery-powered mobile device for RFID privacy management
-
Springer, Berlin
-
Rieback, M., Crispo, B., and Tanenbaum, A. 2008. RFID Guardian: A battery-powered mobile device for RFID privacy management. In Information Security and Privacy. Springer, Berlin, 259-273.
-
(2008)
Information Security and Privacy.
, pp. 259-273
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
41
-
-
84948990100
-
The rc5 encryption algorithm
-
Springer
-
RIVEST, R. L. 1995. The rc5 encryption algorithm. In Fast Software Encryption. Springer, 86-96.
-
(1995)
Fast Software Encryption.
, pp. 86-96
-
-
RIVEST, R.L.1
-
43
-
-
85092032703
-
Security That is Meant to be Skin Deep Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices
-
USENIX
-
Schechter, S. 2010. Security That is Meant to be Skin Deep Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices. In HealthSec. USENIX.
-
(2010)
HealthSec.
-
-
Schechter, S.1
-
44
-
-
0034825932
-
Cmos Process compatible ie-flash (inverse gate electrode flash) technology for system-on-a-chip
-
Shukuri, S., Yanagisawa, K., and Ishibashi, K. 2001. Cmos Process compatible ie-flash (inverse gate electrode flash) technology for system-on-a-chip. In Proceedings of the IEEE Conference on Custom Integrated Circuits, 2001. 179-182.
-
(2001)
Proceedings of the IEEE Conference on Custom Integrated Circuits
, pp. 179-182
-
-
Shukuri, S.1
Yanagisawa, K.2
Ishibashi, K.3
-
46
-
-
33750345292
-
A wirelessly-powered platform for sensing and computation
-
Springer
-
Smith, J. R., Sample, A. P., Powledge, P. S., Roy, S., and Mamishev, A. 2006. A wirelessly-powered platform for sensing and computation. In UbiComp 2006: Ubiquitous Computing. Springer, 495-506.
-
(2006)
UbiComp 2006: Ubiquitous Computing.
, pp. 495-506
-
-
Smith, J.R.1
Sample, A.P.2
Powledge, P.S.3
Roy, S.4
Mamishev, A.5
-
47
-
-
84860267053
-
An Amulet For trustworthy wearable mhealth
-
ACM
-
Sorber, J., Shin, M., Peterson, R., Cornelius, C., Mare, S., Prasad, A., Marois, Z., Smithayer, E., and Kotz, D. 2012. An Amulet For trustworthy wearable mhealth. In Proceedings of the 12th Workshop on Mobile Computing Systems & Applications. ACM, 7.
-
(2012)
Proceedings of the 12th Workshop on Mobile Computing Systems & Applications
, pp. 7
-
-
Sorber, J.1
Shin, M.2
Peterson, R.3
Cornelius, C.4
Mare, S.5
Prasad, A.6
Marois, Z.7
Smithayer, E.8
Kotz, D.9
-
48
-
-
0024645334
-
An 8 bit microcomputer with analog subsystems for implantable biomedical application
-
Stotts, L., Infinger, K., Babka, J., and Genzer, D. 1989. An 8 bit microcomputer with analog subsystems for implantable biomedical application. IEEE Journal of Solid-State Circuits. 292-300.
-
(1989)
IEEE Journal of Solid-State Circuits.
, pp. 292-300
-
-
Stotts, L.1
Infinger, K.2
Babka, J.3
Genzer, D.4
-
51
-
-
4644277489
-
An implantable telemetry platform system for in vivo monitoring of physiological parameters
-
Valdastri, P., Menciassi, A., Arena, A., Caccamo, C., and Dario, P. 2004. An implantable telemetry platform system for in vivo monitoring of physiological parameters. IEEE Transactions on Information Technology in Biomedicine. Vol. 8, 271-278.
-
(2004)
IEEE Transactions on Information Technology in Biomedicine.
, vol.8
, pp. 271-278
-
-
Valdastri, P.1
Menciassi, A.2
Arena, A.3
Caccamo, C.4
Dario, P.5
-
54
-
-
0348011360
-
Pervasive healthcare
-
Varshney, U. 2003. Pervasive healthcare. Computer 36, 12, 138-140.
-
(2003)
Computer
, vol.36
, pp. 138-140
-
-
Varshney, U.1
-
55
-
-
85025404756
-
-
Wang, L., Hammond, P., Johannessen, E., Tang, T., Astaras, A., Beaumont, S., Murray, A., Cooper, J.
-
-
-
Wang, L.1
Hammond, P.2
Johannessen, E.3
Tang, T.4
Astaras, A.5
Beaumont, S.6
Murray, A.7
Cooper, J.8
-
57
-
-
0028407196
-
A low power multi-sensor interface for injectable microprocessor-based animal monitoring system
-
Wouters, P., Cooman, M. D., Lapadatu, D., and Puers, R. 1994. A low power multi-sensor interface for injectable microprocessor-based animal monitoring system. Sensors and Actuators A: Physical. 41-42, 198-206.
-
(1994)
Sensors and Actuators A: Physical.
, vol.41-42
, pp. 198-206
-
-
Wouters, P.1
Cooman, M.D.2
Lapadatu, D.3
Puers, R.4
-
58
-
-
79960873920
-
IMDGuard: Securing implantable medical devices with the external wearable guardian
-
Xu, F., Qin, Z., Tan, C. C., Wang, B., and LI, Q. 2011. IMDGuard: Securing implantable medical devices with the external wearable guardian. IEEE INFOCOM 1862-1870.
-
(2011)
IEEE INFOCOM
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.C.3
Wang, B.4
LI, Q.5
-
59
-
-
84876964630
-
Security analysis of a new ultra-lightweight RFID protocol and its improvement
-
Zhuang, X., Wang, Z.-H., Chang, C.-C., and Zhu, Y. 2013. Security analysis of a new ultra-lightweight RFID protocol and its improvement. Journal of Information Hiding and Multimedia Signal Processing 4, 3.
-
(2013)
Journal of Information Hiding and Multimedia Signal Processing
, vol.4
, pp. 3
-
-
Zhuang, X.1
Wang, Z.-H.2
Chang, C.-C.3
Zhu, Y.4
|