Personal area networks: near-field intrabody communication
IBM Systems Journal
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
How to Break Access Control in a Controlled Manner
CBMS '06 Proceedings of the 19th IEEE Symposium on Computer-Based Medical Systems
How to build a low-cost, extended-range RFID skimmer
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Security and Privacy for Implantable Medical Devices
IEEE Pervasive Computing
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
RFID guardian: a battery-powered mobile device for RFID privacy management
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
High-Power proxies for enhancing RFID privacy and utility
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Proximity-based access control for implantable medical devices
Proceedings of the 16th ACM conference on Computer and communications security
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A taxonomy of vulnerabilities in implantable medical devices
Proceedings of the second annual workshop on Security and privacy in medical and home-care systems
They can hear your heartbeats: non-invasive security for implantable medical devices
Proceedings of the ACM SIGCOMM 2011 conference
Design challenges for secure implantable medical devices
Proceedings of the 49th Annual Design Automation Conference
Toward a safe integrated clinical environment: a communication security perspective
Proceedings of the 2012 ACM workshop on Medical communication systems
Balancing security and utility in medical devices?
Proceedings of the 50th Annual Design Automation Conference
Towards trustworthy medical devices and body area networks
Proceedings of the 50th Annual Design Automation Conference
Heart-to-heart (H2H): authentication for implanted medical devices
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Securing implantable cardiac medical devices: use of radio frequency energy harvesting
Proceedings of the 3rd international workshop on Trustworthy embedded devices
A system architecture, processor, and communication protocol for secure implants
ACM Transactions on Architecture and Code Optimization (TACO)
CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of generating such passwords, or memorizing a random-looking, machine-generated ...