Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
暂无分享,去创建一个
Kevin Fu | Tadayoshi Kohno | Daniel Halperin | Shane S. Clark | Benjamin Ransford | Thomas S. Benjamin | Benessa Defend | Will Morgan | William H. Maisel | Benjamin Ransford | Kevin Fu | W. Maisel | D. Halperin | Tadayoshi Kohno | T. S. Benjamin | Benessa Defend | Will Morgan
[1] Neil Haller,et al. The S/KEY One-Time Password System , 1995, RFC.
[2] Sandeep K. S. Gupta,et al. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[3] Michael Sirivianos,et al. Loud and Clear: Human-Verifiable Authentication Based on Audio , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[4] Nancy G. Leveson,et al. An investigation of the Therac-25 accidents , 1993, Computer.
[5] K.K. Venkatasubramanian,et al. Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.
[6] Brett Kaufman,et al. OsteoConduct: wireless body-area communication based on bone conduction , 2007, BODYNETS.
[7] J. Lebak,et al. Interoperability and Security in Wireless Body Area Network Infrastructures , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[8] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[9] Alanson P. Sample,et al. A Wirelessly-Powered Platform for Sensing and Computation , 2006, UbiComp.
[10] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[11] Andrea Bittau,et al. BlueSniff: Eve Meets Alice and Bluetooth , 2007, WOOT.
[12] W. Maisel,et al. Pacemaker and ICD generator malfunctions: analysis of Food and Drug Administration annual reports. , 2006, JAMA.
[13] Markus G. Kuhn,et al. Compromising Emanations , 2005, Encyclopedia of Cryptography and Security.
[14] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[15] Kevin Fu,et al. Secure Software Updates: Disappointments and New Challenges , 2006, HotSec.
[16] Kevin Fu,et al. Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..
[17] S. Sastry,et al. Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[18] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[19] W. Maisel. Safety issues involving medical devices: implications of recent implantable cardioverter-defibrillator malfunctions. , 2005, JAMA.
[20] Kevin Fu,et al. Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.
[21] Maria L. Gini,et al. Implantable medical devices as agents and part of multiagent systems , 2006, AAMAS '06.
[22] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[23] Daniel E. Holcomb,et al. Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags , 2007 .
[24] Z. Wang,et al. MICS transceivers: regulatory standards and applications [medical implant communications service] , 2005, Proceedings. IEEE SoutheastCon, 2005..
[25] Kevin Fu,et al. Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage , 2006, NDSS.
[26] Joshua R. Smith,et al. Design of a Passively-Powered, Programmable Sensing Platform for UHF RFID Systems , 2007, 2007 IEEE International Conference on RFID.
[27] Dong Chao,et al. Universal Software Radio Peripheral , 2010 .