Securing wireless implantable devices for healthcare: Ideas and challenges
暂无分享,去创建一个
[1] Sandeep K. S. Gupta,et al. Security solutions for pervasive healthcare , 2007 .
[2] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[3] Sandra Upson. Update: Radiation sensor fine-tunes cancer treatments , 2008, IEEE Spectrum.
[4] Bing Jiang,et al. Some Methods for Privacy in RFID Communication , 2004, ESAS.
[5] Ari Juels,et al. Technology Evaluation: The Security Implications of VeriChip Cloning , 2006, J. Am. Medical Informatics Assoc..
[6] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[7] Lan Wang,et al. Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network , 2008, Sensors.
[8] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[9] Lan Wang,et al. Design and implementation of a secure wireless mote-based medical sensor network , 2008, UbiComp.
[10] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[11] Atsushi Kanai,et al. Privacy Enhanced Active RFID Tag , 2005 .
[12] Avishai Wool,et al. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[13] Sandeep K. S. Gupta,et al. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[14] Carmen C. Y. Poon,et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.
[15] Jelena V. Misic,et al. Implementation of security policy for clinical information systems over wireless sensor networks , 2007, Ad Hoc Networks.
[16] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[17] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.