000 02592nam a22005175i 4500
001 978-1-4614-7153-0
003 DE-He213
005 20200421112221.0
007 cr nn 008mamaa
008 130326s2013 xxu| s |||| 0|eng d
020 _a9781461471530
_9978-1-4614-7153-0
024 7 _a10.1007/978-1-4614-7153-0
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aGPF
_2bicssc
072 7 _aCOM031000
_2bisacsh
082 0 4 _a003.54
_223
100 1 _aHei, Xiali.
_eauthor.
245 1 0 _aSecurity for Wireless Implantable Medical Devices
_h[electronic resource] /
_cby Xiali Hei, Xiaojiang Du.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2013.
300 _aXI, 45 p. 13 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computer Science,
_x2191-5768
505 0 _aOverview -- Related Work -- The Resource Depletion Attack and Defense Scheme -- IMD Access Control during Emergencies -- Conclusion and Future Directions.
520 _aIn the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient's medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs.  While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing security schemes, modeling, security analysis, and performance evaluation, thus keeping pace with quickly-evolving wireless security research.
650 0 _aComputer science.
650 0 _aComputer security.
650 0 _aCoding theory.
650 0 _aElectrical engineering.
650 1 4 _aComputer Science.
650 2 4 _aCoding and Information Theory.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aSystems and Data Security.
700 1 _aDu, Xiaojiang.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781461471523
830 0 _aSpringerBriefs in Computer Science,
_x2191-5768
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4614-7153-0
912 _aZDB-2-SCS
942 _cEBK
999 _c57409
_d57409