Blasco et al., 2019 - Google Patents
Wearables security and privacyBlasco et al., 2019
- Document ID
- 17576675945866948131
- Author
- Blasco J
- Chen T
- Kupwade Patil H
- Wolff D
- Publication year
- Publication venue
- Mission-Oriented Sensor Networks and Systems: Art and Science: Volume 2: Advances
External Links
Snippet
Wearable devices equipped with various embedded sensors are finding many applications in health care and other sectors. As a relatively new class of mobile computing, there is little experience with security and privacy problems. This chapter aims to bring attention to these …
- 230000036541 health 0 abstract description 18
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Narwal et al. | A survey on security and authentication in wireless body area networks | |
Ghubaish et al. | Recent advances in the internet-of-medical-things (IoMT) systems security | |
Yaacoub et al. | Securing internet of medical things systems: Limitations, issues and recommendations | |
Somasundaram et al. | Review of security challenges in healthcare internet of things | |
Sun et al. | Security and privacy for the internet of medical things enabled healthcare systems: A survey | |
Ahmed et al. | Insights into Internet of Medical Things (IoMT): Data fusion, security issues and potential solutions | |
Batista et al. | Sensors for context-aware smart healthcare: A security perspective | |
Bhatti et al. | A survey on wireless wearable body area networks: A perspective of technology and economy | |
US11223951B1 (en) | Application-level wireless security for wearable devices | |
Zafar et al. | A systematic review of bio-cyber interface technologies and security issues for internet of bio-nano things | |
Jin et al. | A survey on edge computing for wearable technology | |
US20150089590A1 (en) | Methods for secure control of and secure data extraction from implantable medical devices using smartphones or other mobile devices | |
Sawand et al. | Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems | |
Javali et al. | SeAK: Secure authentication and key generation protocol based on dual antennas for wireless body area networks | |
Awotunde et al. | AIoMT enabling real-time monitoring of healthcare systems: security and privacy considerations | |
Selvaraj et al. | Privacy and security issues on wireless body area and IoT for remote healthcare monitoring | |
Zhao et al. | Biometric behavior authentication exploiting propagation characteristics of wireless channel | |
Blasco et al. | Wearables security and privacy | |
Blow et al. | A study on vulnerabilities and threats to wearable devices | |
Pourbemany et al. | A survey of wearable devices pairing based on biometric signals | |
Siddiqi et al. | Improving the security of the ieee 802.15. 6 standard for medical bans | |
Soni et al. | New directions for security attacks, privacy, and malware detection in WBAN | |
Arya et al. | Data security for WBAN in e-health IoT applications | |
Kumar et al. | A user authentication for healthcare application using wireless medical sensor networks | |
Rajasekaran et al. | A Survey on Exploring the Challenges and Applications of Wireless Body Area Networks (WBANs) |