Security for Wireless Implantable Medical Devices Security for Wireless Implantable Medical Devices
SpringerBriefs in Computer Science

Security for Wireless Implantable Medical Devices

    • $39.99
    • $39.99

Publisher Description

In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient’s medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs.  While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing security schemes, modeling, security analysis, and performance evaluation, thus keeping pace with quickly-evolving wireless security research.

GENRE
Computers & Internet
RELEASED
2013
March 25
LANGUAGE
EN
English
LENGTH
56
Pages
PUBLISHER
Springer New York
SELLER
Springer Nature B.V.
SIZE
1.2
MB

More Books Like This

Intelligent Data Security Solutions for e-Health Applications (Enhanced Edition) Intelligent Data Security Solutions for e-Health Applications (Enhanced Edition)
2020
Emerging Technologies for Authorization and Authentication Emerging Technologies for Authorization and Authentication
2022
Information Security and Assurance Information Security and Assurance
2010
Intelligent Pervasive Computing Systems for Smarter Healthcare Intelligent Pervasive Computing Systems for Smarter Healthcare
2019
Communications and Multimedia Security Communications and Multimedia Security
2011
Emerging Technologies for Authorization and Authentication Emerging Technologies for Authorization and Authentication
2023

Other Books in This Series

The Amazing Journey of Reason The Amazing Journey of Reason
2019
Health Informatics in the Cloud Health Informatics in the Cloud
2012
Guide to Cisco Routers Configuration Guide to Cisco Routers Configuration
2012
Cyber Security Cyber Security
2013
Developing Sustainable and Energy-Efficient Software Systems Developing Sustainable and Energy-Efficient Software Systems
2023
Autonomous Robotics and Deep Learning Autonomous Robotics and Deep Learning
2014