|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-1-4614-7153-0 |
003 |
DE-He213 |
005 |
20220118195743.0 |
007 |
cr nn 008mamaa |
008 |
130326s2013 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781461471530
|9 978-1-4614-7153-0
|
024 |
7 |
|
|a 10.1007/978-1-4614-7153-0
|2 doi
|
050 |
|
4 |
|a QA268
|
050 |
|
4 |
|a Q350-390
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a GPF
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a GPF
|2 thema
|
082 |
0 |
4 |
|a 003.54
|2 23
|
100 |
1 |
|
|a Hei, Xiali.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Security for Wireless Implantable Medical Devices
|h [electronic resource] /
|c by Xiali Hei, Xiaojiang Du.
|
250 |
|
|
|a 1st ed. 2013.
|
264 |
|
1 |
|a New York, NY :
|b Springer New York :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XI, 45 p. 13 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Computer Science,
|x 2191-5776
|
505 |
0 |
|
|a Overview -- Related Work -- The Resource Depletion Attack and Defense Scheme -- IMD Access Control during Emergencies -- Conclusion and Future Directions.
|
520 |
|
|
|a In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient's medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs. While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing security schemes, modeling, security analysis, and performance evaluation, thus keeping pace with quickly-evolving wireless security research.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Data protection.
|
650 |
1 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Data and Information Security.
|
700 |
1 |
|
|a Du, Xiaojiang.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781461471523
|
776 |
0 |
8 |
|i Printed edition:
|z 9781461471547
|
830 |
|
0 |
|a SpringerBriefs in Computer Science,
|x 2191-5776
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-1-4614-7153-0
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|