Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack
暂无分享,去创建一个
[1] Jyh-Long Chern,et al. Coding the chaos in a semiconductor diode for information transmission , 1995 .
[2] Mohsen Guizani,et al. A lightweight live memory forensic approach based on hardware virtualization , 2017, Information Sciences.
[3] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[4] Gregor Leander,et al. Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows , 2015, CT-RSA.
[5] Srdjan Capkun,et al. Proximity-based access control for implantable medical devices , 2009, CCS.
[6] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[7] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[8] Serge Vaudenay. A Classical Introduction To Cryptography , 2005 .
[9] M. Hénon. A two-dimensional mapping with a strange attractor , 1976 .
[10] Tong Kun Lim,et al. Secure communication using small time continuous feedback , 1995 .
[11] Hendrik Richter,et al. The Generalized HÉnon Maps: Examples for Higher-Dimensional Chaos , 2002, Int. J. Bifurc. Chaos.
[12] Wadia Faid Hassan Al-shameri,et al. Dynamical Properties of the Hénon Mapping , 2012 .
[13] Xiaojiang Du,et al. PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system , 2013, 2013 Proceedings IEEE INFOCOM.
[14] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[15] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[16] Fengyuan Xu,et al. IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.
[17] Ingrid Verbauwhede,et al. On the Feasibility of Cryptography for a Wireless Insulin Pump System , 2016, CODASPY.
[18] Xiaojiang Du,et al. Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems , 2018, J. Sens. Actuator Networks.
[19] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[20] Kevin M. Short,et al. UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME , 1996 .
[21] Gengfa Fang,et al. An Improved Binary Sequence Generation for Securing Wireless Body Area Networks , 2015, 2015 IEEE International Conference on Data Science and Data Intensive Systems.
[22] G Ramesh,et al. Security Threats to Mobile Multimedia Applications: Camera-Based Attacks on Mobile Phones , 2018 .