1 |
D. W. Kim, J. W. Han, and K. I. Chung, "Trend of Home Device Authentication/Authorization Technology", Weekly IT BRIEF, No. 1329, pp. 1-11, 2008.
|
2 |
S.Y. Lee, K.B. Yim, K.J. Bae, Taeyoung Jeong, and Jong-Wook Han, "Counterplan of Ubiquitous Home Network Privacy based on Device Authentication and Authorization," Korea Institute of Information Security & Cryptology, Review of KIISC, 18(5), pp.125-131, 2008.
|
3 |
T. M. Song, S. H, Jang, "u-Healthcare : Issue and Research Trends", Korea Institute for Health and Social Affairs, pp. 119-129, Jan. 2011.
|
4 |
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, "Pacemarkers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses", In IEEE Symposium on Security and Privacy. IEEE Computer Society, pp. 1-14, May. 2008.
|
5 |
D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno, and W. H. Maisel, "Security and privacy for implantable medical devices", IEEE Pervasive Computing, Vol. 7, No. 1, pp. 30-39, Jan. 2008.
DOI
ScienceOn
|
6 |
C. Israel, s. Barold, "Pacemaker systems as implantable cardiac rhythm monitors", In American Journal of Cardiology, pp. 442-445, Feb. 2001.
|
7 |
I. Kirschenbaum, A. Wool, "How to build a lowcost, extended-range RFID skimmer", Cryptology ePrint Archive: Report 2006/054, 2006.
|
8 |
K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun, "Proximity-based Access Control for Implantable Medical Devices", 16th ACM conference on Computer and communications security, pp. 411-419, Nov. 2009.
|
9 |
T. Denning, K. Fu, and T. Kohno, "Absence makes the heart grow fonder new directions for implantable medical device security", 3rd USENIX Workshop on Hot Topics in Security, pp. 1-7, Oct. 2008.
|