Usability and security of out-of-band channels in secure device pairing protocols
Proceedings of the 5th Symposium on Usable Privacy and Security
Activity-aware ECG-based patient authentication for remote health monitoring
Proceedings of the 2009 international conference on Multimodal interfaces
Securing medical records on smart phones
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
uWave: Accelerometer-based personalized gesture recognition and its applications
Pervasive and Mobile Computing
Key generation based on acceleration data of shaking processes
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Smarter Phones for Healthier Lifestyles: An Adaptive Fitness Game
IEEE Pervasive Computing
System architecture of a wireless body area sensor network for ubiquitous health monitoring
Journal of Mobile Multimedia
Recognizing whether sensors are on the same body
Pervasive'11 Proceedings of the 9th international conference on Pervasive computing
Adapt-lite: privacy-aware, secure, and efficient mhealth sensing
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
A survey of mobile malware in the wild
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Practical and lightweight domain isolation on Android
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
IEEE Communications Magazine
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Who wears me? bioimpedance as a passive biometric
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
EnGarde: protecting the mobile phone from malicious NFC interactions
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
Towards trustworthy medical devices and body area networks
Proceedings of the 50th Annual Design Automation Conference
PEES: physiology-based end-to-end security for mHealth
Proceedings of the 4th Conference on Wireless Health
A system architecture, processor, and communication protocol for secure implants
ACM Transactions on Architecture and Code Optimization (TACO)
Hi-index | 0.00 |
Mobile technology has significant potential to help revolutionize personal wellness and the delivery of healthcare. Mobile phones, wearable sensors, and home-based tele-medicine devices can help caregivers and individuals themselves better monitor and manage their health. While the potential benefits of this "mHealth" technology include better health, more effective healthcare, and reduced cost, this technology also poses significant security and privacy challenges. In this paper we propose Amulet, an mHealth architecture that provides strong security and privacy guarantees while remaining easy to use, and outline the research and engineering challenges required to realize the Amulet vision.