Security for Wireless Implantable Medical Devices (Record no. 57409)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02592nam a22005175i 4500 |
001 - CONTROL NUMBER | |
control field | 978-1-4614-7153-0 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200421112221.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 130326s2013 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781461471530 |
-- | 978-1-4614-7153-0 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 003.54 |
100 1# - AUTHOR NAME | |
Author | Hei, Xiali. |
245 10 - TITLE STATEMENT | |
Title | Security for Wireless Implantable Medical Devices |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XI, 45 p. 13 illus. |
490 1# - SERIES STATEMENT | |
Series statement | SpringerBriefs in Computer Science, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Overview -- Related Work -- The Resource Depletion Attack and Defense Scheme -- IMD Access Control during Emergencies -- Conclusion and Future Directions. |
520 ## - SUMMARY, ETC. | |
Summary, etc | In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient's medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs. While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing security schemes, modeling, security analysis, and performance evaluation, thus keeping pace with quickly-evolving wireless security research. |
700 1# - AUTHOR 2 | |
Author 2 | Du, Xiaojiang. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-1-4614-7153-0 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | New York, NY : |
-- | Springer New York : |
-- | Imprint: Springer, |
-- | 2013. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Coding theory. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electrical engineering. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Coding and Information Theory. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Communications Engineering, Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2191-5768 |
912 ## - | |
-- | ZDB-2-SCS |
No items available.