Author:
Mitra Anisha,Chowdhury Dipanwita Roy
Publisher
Springer Nature Singapore
Reference19 articles.
1. Almukhlifi A, Almutairi S (2023) Efficient palm vein authentication encryption technique in wireless implantable medical devices. Indones J Electr Eng Comput Sci 30:1651
2. Belkhouja T, Du X, Mohamed A, Al-Ali A, Guizani M (2019) Biometric-based authentication scheme for implantable medical devices during emergency situations. Future Gener Comput Syst 98. https://doi.org/10.1016/j.future.2019.02.002
3. Boston Scientific, Marlborough, USA: Boston Scientific reference Guide for ICDs (2017)
4. Denning T, Fu K, Kohno T (2008) Absence makes the heart grow fonder: new directions for implantable medical device security. In: Proceedings of the 3rd conference on hot topics in security. HOTSEC’08, USENIX Association, USA
5. Desnitsky V, Kotenko I, Zakoldaev D (2019) Evaluation of resource exhaustion attacks against wireless mobile devices. Electronics 8(5). https://doi.org/10.3390/electronics8050500, https://www.mdpi.com/2079-9292/8/5/500