By Topic

Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology

1-3 Oct. 1991

Filter Results

Displaying Results 1 - 25 of 50
  • On inter-realm authentication in large distributed systems

    Publication Year: 1991, Page(s):1 - 2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB)

    Summary form only given. The authors define formally and rationalize a set of policy rules for the propagation of authentication trust across realm boundaries. The use of these rules helps limit global security exposures that ensue whenever an authentication service is compromised. The authors present the design of a simple, general protocol which satisfies these rules and shares the simplicity an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology (Cat. No.91CH3031-2)

    Publication Year: 1991
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Security on database systems and distributed databases

    Publication Year: 1991, Page(s):219 - 220
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Summary form only given. Four aspects of information security on database systems are discussed: confidentiality (ensuring information is not subject to unauthorized disclosure); integrity (ensuring information is not subject to unauthorized and undetected modification); inference (ensuring information cannot be deduced from observable); and authentication (ensuring that the invokee of the message... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Utilization of high-power microwave sources in electronic sabotage and terrorism

    Publication Year: 1991, Page(s):16 - 20
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    High-power microwave (HPM) sources have been under investigation for several years as potential weapons for a variety of sabotage, terrorism, counter-security system, and combat applications. The key points to recognize are the insidious nature of HPM and the many areas in which it can impact on security technology. Computers and other equipment can be damaged without user recognition of the cause... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient probabilistic public-key block encryption and signature scheme based on El-Gamal's scheme

    Publication Year: 1991, Page(s):145 - 148
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    A modified El Gamal scheme is presented which provides both secrecy and signature simultaneously with a high information rate of w/w+2, where w is a predetermined number of plaintext blocks to be sent. The scheme provides a better information rate than the original El Gamal scheme does, and thus is very efficient to use in secure data communications. The security of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Public-key ID-based cryptosystem

    Publication Year: 1991, Page(s):142 - 144
    Cited by:  Papers (1)  |  Patents (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    It is shown how a chosen-public-key attack can compromise the ID-based cryptosystem of S. Tsujii and T. Itoh (1989), as well as most of the existing public-key cryptosystems. The authors present a scheme which can withstand the chosen-public-key attack, based on the concept of an cryptosystem. The security of the scheme is equivalent to factoring the product of two large primes or solving the disc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic vehicle identification-AVI-electronic license plates: the public safety perspective

    Publication Year: 1991, Page(s):96 - 99
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Describes a plan which envisages that all vehicles are equipped with electronic license plates or tags which are monitored and automatically interrogated by monitor stations located in suitable sites along intercity roads and in cities themselves. This data is transmitted to a regional and/or national data collection center, analyzed, and forwarded to appropriate agencies on a selective and priori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer viruses: ways of reproduction in MS-DOS

    Publication Year: 1991, Page(s):168 - 176
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    The methods used by computer viruses to reproduce themselves in IBM PC-compatibles operating under MS-DOS are studied. The results can be of use for classification of viruses and the creation of anti-virus tools. Viruses are examined under the following headings: irritating viruses, viruses that damage files, viruses that damage the file system and viruses that injure the hardware View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of data, devices, documents and individuals

    Publication Year: 1991, Page(s):197 - 218
    Cited by:  Papers (4)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1660 KB)

    The author mainly examines the information integrity aspects of the problem of identification, although some of the applications are primarily concerned with the physical aspects of identification. He is concerned with indirect identification, where the verifier (who may be either a person or a device) is dependent on information provided by the object of the identification (who again may be eithe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic authentication of passwords

    Publication Year: 1991, Page(s):126 - 130
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    A password authentication scheme based on El Gamal's (1985) public key cryptosystem and signature scheme is proposed. This scheme permits each user to choose passwords and identities individually. The password is used as the user's secret key. Using the users public key and identity, the computer system can generate a set of test patterns and store them in a verification table. In the test pattern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A non-lethal high-voltage intelligent intrusion sensor

    Publication Year: 1991, Page(s):304 - 307
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Presents a nonlethal high-voltage intelligent intrusion detection sensor for perimeter alarm systems. The sensor looks like a conventional high-voltage electric net barrier. It is a kind of outdoor detection system, and functions not only as a fearsome obstacle but also as an intrusion detector. The alarm detection algorithm, which classifies the sensor readings into three levels (alarm, uncertain... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic speaker recognition based upon various distances of LSP frequencies

    Publication Year: 1991, Page(s):104 - 109
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    A way to identify people by voice is discussed. A speaker's spectral information represented by line spectrum pair (LSP) frequencies is used to describe characteristics of the speaker's utterance and the VQ (vector quantization) method is used to model the spectral distribution of each speaker. Some easily computed distances (Euclidean distance, weighted distance by F-ratio, and hard-limited dista... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Passive location of mobile cellular telephone terminals

    Publication Year: 1991, Page(s):221 - 225
    Cited by:  Papers (6)  |  Patents (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    The strengths and weaknesses are discussed of various elements of possible methods for determining the location of cellular telephones using the North American AMPS (Advance Mobile Phone System) analog cellular telephone standard which require no modifications or assistance from the mobile units. Each element suffers from multipath effects and requires different levels of hardware addition at the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ID-based signature scheme based upon Rabin's public key cryptosystem

    Publication Year: 1991, Page(s):139 - 141
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    A novel identity-based signature scheme based on M.O. Rabin's (1979) algorithm is proposed. Senders can sign a message by doing several multiplication operations and several addition operations. The verifier can also easily check the authenticity of the message. From the viewpoint of computation time, the proposed scheme is more efficient than the existing schemes View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The discrimination of vowels by computers

    Publication Year: 1991, Page(s):315 - 318
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    The voice control of automated machines is addressed. The author applies the periodical property of vowels and uses the Fourier-transform method to discriminate vowels according to their significant frequencies. An analog-digital interface card is used to convert the sound wave into digital data. The spectrum of several vowels is displayed and discriminated View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of General Services Administration's risk assessment methodology

    Publication Year: 1991, Page(s):325 - 332
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    Security surveys must identify and consider any possible risk factors which might affect the security of a building, its tenants, and/or contents. Utilizing these factors and available office automation, spreadsheet software an algorithm called the risk assessment matrix (RAM) was developed to calculate risk levels associated with the characteristics of the building, resulting in generation of rep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Live scan fingerprint imagery using high resolution C-scan ultrasonography

    Publication Year: 1991, Page(s):88 - 95
    Cited by:  Papers (2)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    High-frequency ultrasound is proposed as a means for performing live scan fingerprint imagery. Fundamental ultrasonic imaging concepts and their relationship to imaging the ridge structure of the finger are discussed. The ability to obtain an image of the fingerprint using ultrasound is based on the acoustical impedance difference between human tissue (i.e. a ridge) and air (i.e. a valley). This a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • `The digital doorkeeper'-automatic face recognition with the computer

    Publication Year: 1991, Page(s):77 - 83
    Cited by:  Papers (1)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    The problem of automatic face recognition is investigated. A multiresolution representation of the scene is scanned with a matched filter based on local orientation for the reliable localization of human faces. For the identification of the faces, two complementary strategies are used. At low resolution, the three most important features of a face (head, eye pairs, and nose/mouth/chin) are compare... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A strategy for transforming public-key cryptosystems into identity-based cryptosystems

    Publication Year: 1991, Page(s):68 - 72
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Proposes a general strategy for modifying public-key cryptosystems such that public-key files are no longer necessary. Instead, the users' identity codes are used as the public keys. Their plaintexts are encrypted by using some public information and the receiver's identity code. The securities of the modified cryptosystems are shown to be as good as the securities of the original cryptosystems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RETISS: a real time security system for threat detection using fuzzy logic

    Publication Year: 1991, Page(s):161 - 167
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    A real-time security system (RETISS) for threat detection is described, pointing out security violations in the target system under control. RETISS is based on the hypothesis that a correlation exists between anomalous user behavior and threats. Security rules have been enforced to express this correlation and to detect and evaluate the probability of a given threat, based on the level of danger o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The cost of security

    Publication Year: 1991, Page(s):192 - 196
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    The author proposes concepts that could help in assessing the economic impact of computer security measures. The Parker-Benson mode is considered, and attention is given to such issues as the broadening of cost-benefit analysis (CBA) and information vs. security economics. It is concluded that it is possible to afford the difficult task of demonstrating the cost-effectiveness of security measures ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure communication networks based on the public-key cryptosystem in GF(2m)

    Publication Year: 1991, Page(s):120 - 125
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    The application of the Massey-Omura lock (MOL) to obtain data encryption and digital signatures in intelligent networks is discussed. MOL is a mathematical padlock based on field exponentiation in GF(2m) with normal basis representation. If a special mathematical MOL processor is available, the encryption-decryption rate can be accelerated significantly. Recent results on the analysis a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A randomness conserved exponential mapping of a GF(q) m-sequence

    Publication Year: 1991, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    Proposes an exponential nonlinear mapping of the maximum length sequence (M-sequence) over GF(q) which not only increases the linear complexity but also conserves the randomness and period length of the input sequence. For the properly chosen exponent of the exponential operation one-to-one mapping can be obtained to keep the balance, run, and long period properties of the input sequence.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The mass spectrometric analysis of drugs and metabolites in urine

    Publication Year: 1991, Page(s):246 - 252
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    A mass spectrometric analysis of MA (methamphetamine) was performed. Quantities of MA were determined by the selected ion monitoring (SIM) and selected reaction monitoring (SRM) techniques. The limits of detection of MA standard solution and MA in urine are discussed. The limit of detection of MA is less than 1 ng. A urine sample can be analyzed directly without pretreatment procedures. The time r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The application of ultrasound in the guidance system [of an AGV]

    Publication Year: 1991, Page(s):296 - 303
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    The use of ultrasound instead of radio waves for the guidance system for an automated guided vehicle (AGV) is proposed because it takes a very long antenna to discriminate between the detected radio waves. An onboard microprocessor-based controller has been implemented. The system function, software, and hardware organization of the AGV are described, and experimental data and error analysis are p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.