On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.
Eduard MarinDave SingeléeFlavio D. GarciaTom ChothiaRik WillemsBart PreneelPublished in: ACSAC (2016)
Keyphrases
- security requirements
- security issues
- security measures
- security level
- security mechanisms
- key management
- security protocols
- security properties
- security management
- security analysis
- data security
- security services
- access control
- cryptographic protocols
- electronic voting
- sensitive data
- stream cipher
- security model
- encryption scheme
- authentication mechanism
- data encryption
- information security
- key agreement protocol
- key establishment
- diffie hellman
- user authentication
- mobile agent system
- security architecture
- authentication protocol
- digital signature scheme
- key exchange
- security patterns
- public key encryption
- security policies
- secret key
- identity management
- key distribution
- high security
- secure communication
- covert channel
- key agreement
- network security
- key management scheme
- electronic payment
- key exchange protocol
- digital rights management
- integrity verification
- trusted computing
- private key
- smart card
- public key cryptosystem
- secure routing
- rfid systems
- patient specific
- mutual authentication
- countermeasures
- public key
- digital signature
- authentication scheme
- sensitive information
- single point of failure
- information leakage
- advanced encryption standard
- unauthorized access
- standard model
- intrusion detection