2018
DOI: 10.1016/j.jnca.2018.01.009
|View full text |Cite
|
Sign up to set email alerts
|

Powerless security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…is part shows IMDs' main security attacks [10] and discusses the security requirements in Figure 3. Table 2 explains the symbols and definitions of all the authentication protocols.…”
Section: Security Attacks and Requirements For Imdsmentioning
confidence: 99%
See 2 more Smart Citations
“…is part shows IMDs' main security attacks [10] and discusses the security requirements in Figure 3. Table 2 explains the symbols and definitions of all the authentication protocols.…”
Section: Security Attacks and Requirements For Imdsmentioning
confidence: 99%
“…e advantages of RFID protocols [6][7][8][9], the fog computing, and blockchain in the medical applications provide security and privacy protection for storing and sharing physiological signal records. It can provide doctors with collaboration ways through IMD [10] and RFID to help patients in case of emergencies mode. e new model based on blockchain can support medical background rural healthcare and analyse data for medicines and medical research [11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Ellouze et al [8,9] propose an RFID-based, energyharvesting solution, that uses the same WISP module as employed by [16]. In contrast to [16], their solution additionally provides mutual authentication.…”
Section: Harvesting-based Techniquesmentioning
confidence: 99%
“…Ellouze et al [6,7] propose an RFID-based, energy-harvesting solution, that uses the same WISP module as employed by [12]. In contrast to [12], their solution additionally provides mutual authentication.…”
Section: A Survey Of Existing Zpd Techniquesmentioning
confidence: 99%