Security and Privacy for Implantable Medical Devices

Nonfiction, Science & Nature, Technology, Electronics, Circuits, Computers, Networking & Communications, Computer Security
Cover of the book Security and Privacy for Implantable Medical Devices by , Springer New York
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781461416746
Publisher: Springer New York Publication: December 3, 2013
Imprint: Springer Language: English
Author:
ISBN: 9781461416746
Publisher: Springer New York
Publication: December 3, 2013
Imprint: Springer
Language: English

This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from Computer Security and Cryptography present new research which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in Computer Science privacy research, as well as lightweight solutions appropriate for implementation in IMDs.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from Computer Security and Cryptography present new research which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in Computer Science privacy research, as well as lightweight solutions appropriate for implementation in IMDs.

More books from Springer New York

Cover of the book Core Concepts in Parenchymal Kidney Disease by
Cover of the book Cognitive Microgenesis by
Cover of the book Mathematics for Natural Scientists by
Cover of the book Pluripotency in Domestic Animal Cells by
Cover of the book Handbook of Computational Approaches to Counterterrorism by
Cover of the book Atlas of Sectional Radiological Anatomy for PET/CT by
Cover of the book Interventions for Autism Spectrum Disorders by
Cover of the book Immunomic Discovery of Adjuvants and Candidate Subunit Vaccines by
Cover of the book Principles of Renal Physiology by
Cover of the book Genetic and Molecular Epidemiology of Multiple Myeloma by
Cover of the book Introduction to Linear Elasticity by
Cover of the book Experimental Hematology Today 1979 by
Cover of the book Circumareolar Techniques for Breast Surgery by
Cover of the book Melanocytic Lesions by
Cover of the book The Motivational Impact of Nicotine and its Role in Tobacco Use by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy