DTW based Authentication for Wireless Medical Device Security
暂无分享,去创建一个
Xiaojiang Du | Mohsen Guizani | Heena Rathore | Abdulla K. Al-Ali | Amr Mohamed | M. Guizani | Xiaojiang Du | Amr M. Mohamed | Heena Rathore | A. Al-Ali
[1] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[2] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[3] V. Muthukkumarasamy,et al. Authenticated Key Establishment Protocols for a Home Health Care System , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[4] G. W. Hughes,et al. Minimum Prediction Residual Principle Applied to Speech Recognition , 1975 .
[5] Xiaojiang Du,et al. A review of security challenges, attacks and resolutions for wireless medical devices , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[6] Xiaojiang Du,et al. Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.
[7] Xiaojiang Du,et al. PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system , 2013, 2013 Proceedings IEEE INFOCOM.
[8] Heena Rathore. Mapping Biological Systems to Network Systems , 2016 .
[9] Michael Szycher. Commercialization Secrets for Scientists and Engineers , 2016 .
[10] Jie Wu,et al. Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[11] Xiaojiang Du,et al. DLRT: Deep Learning Approach for Reliable Diabetic Treatment , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[12] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[13] Eryk Dutkiewicz,et al. An ECG-based Secret Data Sharing scheme supporting emergency treatment of Implantable Medical Devices , 2014, 2014 International Symposium on Wireless Personal Multimedia Communications (WPMC).
[14] Fengyuan Xu,et al. IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.
[15] C. Loan. Computational Frameworks for the Fast Fourier Transform , 1992 .
[16] Hyogon Kim,et al. In-vivo NFC: remote monitoring of implanted medical devices with improved privacy , 2012, SenSys '12.
[17] Srdjan Capkun,et al. Proximity-based access control for implantable medical devices , 2009, CCS.
[18] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[19] Andrew S. Tanenbaum,et al. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.
[20] Eamonn J. Keogh,et al. Everything you know about Dynamic Time Warping is Wrong , 2004 .
[21] Farinaz Koushanfar,et al. Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.
[22] Mohsen Guizani,et al. Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.
[23] S. Chiba,et al. Dynamic programming algorithm optimization for spoken word recognition , 1978 .
[24] Alan Bundy,et al. Dynamic Time Warping , 1984 .
[25] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[26] Srinivasan Jayaraman,et al. Human Electrocardiogram for Biometrics Using DTW and FLDA , 2010, 2010 20th International Conference on Pattern Recognition.
[27] Meinard Müller,et al. Dynamic Time Warping , 2008 .
[28] Meng Zhang,et al. MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection , 2013, IEEE Transactions on Biomedical Circuits and Systems.
[29] Xiaojiang Du,et al. Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System , 2015, IEEE Transactions on Parallel and Distributed Systems.
[30] Kevin Fu,et al. Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security , 2008, HotSec.
[31] Xiaojiang Du,et al. Biometric-based two-level secure access control for Implantable Medical Devices during emergencies , 2011, 2011 Proceedings IEEE INFOCOM.
[32] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[33] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.