000 | 02592nam a22005175i 4500 | ||
---|---|---|---|
001 | 978-1-4614-7153-0 | ||
003 | DE-He213 | ||
005 | 20200421112221.0 | ||
007 | cr nn 008mamaa | ||
008 | 130326s2013 xxu| s |||| 0|eng d | ||
020 |
_a9781461471530 _9978-1-4614-7153-0 |
||
024 | 7 |
_a10.1007/978-1-4614-7153-0 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aGPF _2bicssc |
|
072 | 7 |
_aCOM031000 _2bisacsh |
|
082 | 0 | 4 |
_a003.54 _223 |
100 | 1 |
_aHei, Xiali. _eauthor. |
|
245 | 1 | 0 |
_aSecurity for Wireless Implantable Medical Devices _h[electronic resource] / _cby Xiali Hei, Xiaojiang Du. |
264 | 1 |
_aNew York, NY : _bSpringer New York : _bImprint: Springer, _c2013. |
|
300 |
_aXI, 45 p. 13 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
505 | 0 | _aOverview -- Related Work -- The Resource Depletion Attack and Defense Scheme -- IMD Access Control during Emergencies -- Conclusion and Future Directions. | |
520 | _aIn the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient's medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs. While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing security schemes, modeling, security analysis, and performance evaluation, thus keeping pace with quickly-evolving wireless security research. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aElectrical engineering. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aSystems and Data Security. |
700 | 1 |
_aDu, Xiaojiang. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781461471523 |
830 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4614-7153-0 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c57409 _d57409 |