Balancing security and utility in Medical Devices?
暂无分享,去创建一个
Farinaz Koushanfar | Wayne P. Burleson | Ari Juels | Masoud Rostami | A. Juels | F. Koushanfar | W. Burleson | M. Rostami
[1] Bruce J. West,et al. Chaos and fractals in human physiology. , 1990, Scientific American.
[2] Joseph A. Paradiso,et al. Applying electric field sensing to human-computer interfaces , 1995, CHI '95.
[3] Thomas G. Zimmerman,et al. : Near-field , 2022 .
[4] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[5] S. Cerutti,et al. Applying nonlinear noise reduction in the analysis of heart rate variability , 2001, IEEE Engineering in Medicine and Biology Magazine.
[6] P. Hänggi,et al. Quantification of heart rate variability by discrete nonstationary non-Markov stochastic processes. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[7] Sandeep K. S. Gupta,et al. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[8] J. Lebak,et al. Interoperability and Security in Wireless Body Area Network Infrastructures , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[9] Joseph A. Paradiso,et al. Energy scavenging for mobile and wireless electronics , 2005, IEEE Pervasive Computing.
[10] W. Maisel. Safety issues involving medical devices: implications of recent implantable cardioverter-defibrillator malfunctions. , 2005, JAMA.
[11] S. Sastry,et al. Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[12] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[13] Carmen C. Y. Poon,et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.
[14] Kevin Fu,et al. Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..
[15] Kailash Gopalakrishnan,et al. Overview of candidate device technologies for storage-class memory , 2008, IBM J. Res. Dev..
[16] K.K. Venkatasubramanian,et al. Plethysmogram-based secure inter-sensor communication in Body Area Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[17] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[18] Kevin Fu,et al. Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security , 2008, HotSec.
[19] Leonid Reyzin,et al. Key Agreement from Close Secrets over Unsecured Channels , 2009, IACR Cryptol. ePrint Arch..
[20] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[21] Carmen C. Y. Poon,et al. Using the Timing Information of Heartbeats as an Entity Identifier to Secure Body Sensor Network , 2008, IEEE Transactions on Information Technology in Biomedicine.
[22] Srdjan Capkun,et al. Proximity-based access control for implantable medical devices , 2009, CCS.
[23] Ayan Banerjee,et al. PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.
[24] Sandeep K. S. Gupta,et al. Physiological value-based efficient usable security solutions for body sensor networks , 2010, TOSN.
[25] Qi Hao,et al. Trustworthy Data Collection From Implantable Medical Devices Via High-Speed Security Implementation Based on IEEE 1363 , 2010, IEEE Transactions on Information Technology in Biomedicine.
[26] Dong Hoon Lee,et al. Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks , 2011, WISA.
[27] Panagiotis Papadimitratos,et al. Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures , 2011, IEEE Transactions on Wireless Communications.
[28] Fengyuan Xu,et al. IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.
[29] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.
[30] Farinaz Koushanfar,et al. Hybrid heterogeneous energy supply networks , 2011, 2011 IEEE International Symposium of Circuits and Systems (ISCAS).
[31] Niraj K. Jha,et al. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.
[32] Kevin Fu,et al. Design challenges for secure implantable medical devices , 2012, DAC Design Automation Conference 2012.
[33] Srdjan Capkun,et al. Distance Hijacking Attacks on Distance Bounding Protocols , 2012, 2012 IEEE Symposium on Security and Privacy.
[34] Yih-Chun Hu,et al. Body Area Network Security: Robust Key Establishment Using Human Body Channel , 2012, HealthSec.
[35] Xiaofeng Liao,et al. Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.
[36] Peng Ning,et al. Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time , 2013, 2013 IEEE Symposium on Security and Privacy.
[37] Fan Zhang,et al. OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks , 2013, 2013 Proceedings IEEE INFOCOM.