Security for Wireless Implantable Medical Devices

Nonfiction, Computers, Advanced Computing, Theory, Science & Nature, Technology, Telecommunications, Reference & Language, Reference
Cover of the book Security for Wireless Implantable Medical Devices by Xiali Hei, Xiaojiang Du, Springer New York
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Xiali Hei, Xiaojiang Du ISBN: 9781461471530
Publisher: Springer New York Publication: March 25, 2013
Imprint: Springer Language: English
Author: Xiali Hei, Xiaojiang Du
ISBN: 9781461471530
Publisher: Springer New York
Publication: March 25, 2013
Imprint: Springer
Language: English

In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient’s medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs.  While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing security schemes, modeling, security analysis, and performance evaluation, thus keeping pace with quickly-evolving wireless security research.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient’s medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs.  While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing security schemes, modeling, security analysis, and performance evaluation, thus keeping pace with quickly-evolving wireless security research.

More books from Springer New York

Cover of the book Nuclear Oncology by Xiali Hei, Xiaojiang Du
Cover of the book Statistics and Data Analysis for Financial Engineering by Xiali Hei, Xiaojiang Du
Cover of the book Advanced Dairy Chemistry by Xiali Hei, Xiaojiang Du
Cover of the book Rhinosinusitis by Xiali Hei, Xiaojiang Du
Cover of the book Environmentally Friendly Machining by Xiali Hei, Xiaojiang Du
Cover of the book Optimal Control with Aerospace Applications by Xiali Hei, Xiaojiang Du
Cover of the book Genetic Variants in Alzheimer's Disease by Xiali Hei, Xiaojiang Du
Cover of the book Applied Bayesian Statistics by Xiali Hei, Xiaojiang Du
Cover of the book Recent Advances and Future Directions in Bone Marrow Transplantation by Xiali Hei, Xiaojiang Du
Cover of the book Ignitability and Explosibility of Gases and Vapors by Xiali Hei, Xiaojiang Du
Cover of the book Effective Risk Communication by Xiali Hei, Xiaojiang Du
Cover of the book VCO-Based Quantizers Using Frequency-to-Digital and Time-to-Digital Converters by Xiali Hei, Xiaojiang Du
Cover of the book Gametogenesis, Early Embryo Development and Stem Cell Derivation by Xiali Hei, Xiaojiang Du
Cover of the book Challenges in Mechanics of Time-Dependent Materials and Processes in Conventional and Multifunctional Materials, Volume 2 by Xiali Hei, Xiaojiang Du
Cover of the book Listen to the Music by Xiali Hei, Xiaojiang Du
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy