Security Analysis of Wearable Smart Health Devices and Their Companion Apps.
Daniel TimkoMike SharkoYanyan LiPublished in: SP (Workshops) (2024)
Keyphrases
- security analysis
- continuous monitoring
- wearable devices
- physical activity
- health monitoring
- mobile applications
- smart card
- smart environments
- public key
- security requirements
- high security
- encryption scheme
- mobile apps
- security properties
- image encryption
- mobile devices
- ambient intelligence
- authentication protocol
- activity recognition
- user authentication
- low cost
- authentication scheme
- mutual authentication
- sensor networks
- information systems
- context aware
- software engineering