By Topic

Security Technology, 1991. Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on

Date 1-3 Oct. 1991

Filter Results

Displaying Results 1 - 25 of 50
  • Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology (Cat. No.91CH3031-2)

    Publication Year: 1991
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • A private key cryptosystem based upon enforced random substitution scheme

    Publication Year: 1991, Page(s):319 - 324
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    Proposes a private key cryptosystem in which a specially designed permutation table is used as an enciphering/deciphering key. By the permutation table, an enforced random substitution scheme substitutes the characters in a plaintext message. It is hard to guess the correct plaintext characters from known ciphertext characters. The secure measurement and some possible attacks on the proposed crypt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic vehicle identification-AVI-electronic license plates: the public safety perspective

    Publication Year: 1991, Page(s):96 - 99
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Describes a plan which envisages that all vehicles are equipped with electronic license plates or tags which are monitored and automatically interrogated by monitor stations located in suitable sites along intercity roads and in cities themselves. This data is transmitted to a regional and/or national data collection center, analyzed, and forwarded to appropriate agencies on a selective and priori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive IIR filter in frequency domain and its application

    Publication Year: 1991, Page(s):290 - 295
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    An adaptive IIR (infinite impulse response) filter in the frequency domain is proposed. This structure may detect every incoming noisy sinusoid in a relatively short period of time. It can also be constructed as a multiple notch filter. Simulation shows that its performance is good enough, even though the desired signal and jammer appear at both the reference and the primary inputs. This result ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ID-based signature scheme based upon Rabin's public key cryptosystem

    Publication Year: 1991, Page(s):139 - 141
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    A novel identity-based signature scheme based on M.O. Rabin's (1979) algorithm is proposed. Senders can sign a message by doing several multiplication operations and several addition operations. The verifier can also easily check the authenticity of the message. From the viewpoint of computation time, the proposed scheme is more efficient than the existing schemes View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The discrimination of vowels by computers

    Publication Year: 1991, Page(s):315 - 318
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    The voice control of automated machines is addressed. The author applies the periodical property of vowels and uses the Fourier-transform method to discriminate vowels according to their significant frequencies. An analog-digital interface card is used to convert the sound wave into digital data. The spectrum of several vowels is displayed and discriminated View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Live scan fingerprint imagery using high resolution C-scan ultrasonography

    Publication Year: 1991, Page(s):88 - 95
    Cited by:  Papers (2)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    High-frequency ultrasound is proposed as a means for performing live scan fingerprint imagery. Fundamental ultrasonic imaging concepts and their relationship to imaging the ridge structure of the finger are discussed. The ability to obtain an image of the fingerprint using ultrasound is based on the acoustical impedance difference between human tissue (i.e. a ridge) and air (i.e. a valley). This a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction of great seismic waves by gravitational wave detectors. II. Noise and sensitivity of detectors

    Publication Year: 1991, Page(s):285 - 289
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    The prediction of a large seismic wave can be done according to gravitational field turbulence, which travels at the speed of light. The authors describe the sensitivity and noise of the corresponding gravitational wave detector. When an earthquake has a magnitude of seven, the gravitational deviation induces a detectable strain in the antenna bar. Accordingly, seismic waves can be detected by a g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new cryptosystem using matrix transformation

    Publication Year: 1991, Page(s):131 - 138
    Cited by:  Papers (4)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    An improvement of the Hill cipher is proposed. In the Hill cipher, a randomly generated nonsingular matrix is used as an encryption key, and the inverse of the matrix is used as the decryption key. The weakness of Hill cipher is that the matrix may be revealed under known-plaintext attack. In the proposed cryptosystem a plaintext message is first partitioned into some suitable length of blocks and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A strategy for transforming public-key cryptosystems into identity-based cryptosystems

    Publication Year: 1991, Page(s):68 - 72
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Proposes a general strategy for modifying public-key cryptosystems such that public-key files are no longer necessary. Instead, the users' identity codes are used as the public keys. Their plaintexts are encrypted by using some public information and the receiver's identity code. The securities of the modified cryptosystems are shown to be as good as the securities of the original cryptosystems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high speed modified Hopfield neural network and a design of character recognition system

    Publication Year: 1991, Page(s):308 - 314
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    A digital methodology called single error correction-single error detection (SECSED) is used to improve the learning and recall rules of the conventional Hopfield neural network. The XOR operator is used to implement the learning phase and the recall phase of the modified network. The bulk data processing of the modified Hopfield network is much faster than that of the conventional Hopfield networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A topology-based matching algorithm for fingerprint authentication

    Publication Year: 1991, Page(s):84 - 87
    Cited by:  Papers (14)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    A proper representation of the ridge pattern on a fingerprint is addressed. The representation must be such that it supports fingerprint matching. A nonink fingerprint input device using an optical prism is considered. A ridge pattern based on a structural model of minutiae is developed. Finally, a fingerprint matching method via tree matching is given. This method is shown to be invariant under t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The proposed self-scanned array IR sensor based upon pyroelectric elements

    Publication Year: 1991, Page(s):281 - 284
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    Examines some proposed configurations of pyroelectric sensor arrays scanned either by a CCD (charge-coupled device) structure or by the matrix approach. The pyroelectric array sensor is based on a single-crystal pyroelectric plate (LiTaO3) covered by an array of electrodes created by photolithography. The proposed approach has been experimentally verified by a mathematical model and by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RETISS: a real time security system for threat detection using fuzzy logic

    Publication Year: 1991, Page(s):161 - 167
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    A real-time security system (RETISS) for threat detection is described, pointing out security violations in the target system under control. RETISS is based on the hypothesis that a correlation exists between anomalous user behavior and threats. Security rules have been enforced to express this correlation and to detect and evaluate the probability of a given threat, based on the level of danger o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic authentication of passwords

    Publication Year: 1991, Page(s):126 - 130
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    A password authentication scheme based on El Gamal's (1985) public key cryptosystem and signature scheme is proposed. This scheme permits each user to choose passwords and identities individually. The password is used as the user's secret key. Using the users public key and identity, the computer system can generate a set of test patterns and store them in a verification table. In the test pattern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trends towards the optimum danger detection system

    Publication Year: 1991, Page(s):253 - 260
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB)

    Based on examples of fire and intrusion detection systems, the author discusses current developments and trends for improving detection techniques in order to overcome the problems of deceptive alarms. Trends in the direction of improved aesthetics of danger detection systems, particularly the miniaturization of detectors and wireless transmission are also covered. Finally, the issues of reliabili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An authenticate processing for the information system in Industrial Technology Research Institute

    Publication Year: 1991, Page(s):59 - 67
    Cited by:  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    A technique for storing, processing, and transmitting highly sensitive information over a computer network in the Industrial Technology Research Institute's application system is described. Both secrecy information and user passwords for accessing this information are encrypted by using the public key cryptosystem of the RSA (River-Shamir-Adleman) scheme and El Gamal public key cryptosystem. Based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A non-lethal high-voltage intelligent intrusion sensor

    Publication Year: 1991, Page(s):304 - 307
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Presents a nonlethal high-voltage intelligent intrusion detection sensor for perimeter alarm systems. The sensor looks like a conventional high-voltage electric net barrier. It is a kind of outdoor detection system, and functions not only as a fearsome obstacle but also as an intrusion detector. The alarm detection algorithm, which classifies the sensor readings into three levels (alarm, uncertain... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient probabilistic public-key block encryption and signature scheme based on El-Gamal's scheme

    Publication Year: 1991, Page(s):145 - 148
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    A modified El Gamal scheme is presented which provides both secrecy and signature simultaneously with a high information rate of w/w+2, where w is a predetermined number of plaintext blocks to be sent. The scheme provides a better information rate than the original El Gamal scheme does, and thus is very efficient to use in secure data communications. The security of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • `The digital doorkeeper'-automatic face recognition with the computer

    Publication Year: 1991, Page(s):77 - 83
    Cited by:  Papers (1)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    The problem of automatic face recognition is investigated. A multiresolution representation of the scene is scanned with a matched filter based on local orientation for the reliable localization of human faces. For the identification of the faces, two complementary strategies are used. At low resolution, the three most important features of a face (head, eye pairs, and nose/mouth/chin) are compare... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study on hunting a brilliant hacker

    Publication Year: 1991, Page(s):177 - 180
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    In December 1989, a computer intruder broke into the computer systems in Academia Sinica, Taipei. Instead of trying to keep the intruder out, the approach was taken of allowing him access and tracing his activities. Instead of using printers, personal computer and hard disk were used to record the intruder's activities. The trace was harder than expected; it took nearly two months. The search for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optical fiber multisensor network for security applications

    Publication Year: 1991, Page(s):271 - 280
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    Reports an investigation of the performance of an optical fiber multisensor network using a simple frequency-domain multiplexing technique. The major limitation of this system is phase-error-induced crosstalk. Theory suggests that this error can be minimized by carefully designing the operational parameters (sensor loop lengths and modulation frequencies) to make the determinant of the operation m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed audit with secure remote procedure calls

    Publication Year: 1991, Page(s):154 - 160
    Cited by:  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    The authors have designed and implemented an experimental secure remote procedure call (RPC) mechanism and an RPC interface for a distributed audit mechanism running on AIX version 3 on the RISC System/6000. Based on the secure RPC mechanism and the network file system, the authors have designed and implemented a high-level, protocol-transparent interface for a distributed audit mechanism with cen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Axytrans HDS-secure transport of money and valuables, protected by information technology

    Publication Year: 1991, Page(s):29 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    Using advanced techniques provided by information technology, especially authentication techniques using industrial cryptography. the Axytrans system provides protected transport of money and valuables. Making transported goods worthless but identifiable, makes physical violence useless and saves lives. The Axytrans hold-down system (HDS) has been chosen by the Belgian PTT for their money transpor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure communication networks based on the public-key cryptosystem in GF(2m)

    Publication Year: 1991, Page(s):120 - 125
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    The application of the Massey-Omura lock (MOL) to obtain data encryption and digital signatures in intelligent networks is discussed. MOL is a mathematical padlock based on field exponentiation in GF(2m) with normal basis representation. If a special mathematical MOL processor is available, the encryption-decryption rate can be accelerated significantly. Recent results on the analysis a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.