Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology

1-3 Oct. 1991

Filter Results

Displaying Results 1 - 25 of 50
  • On inter-realm authentication in large distributed systems

    Publication Year: 1991, Page(s):1 - 2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (138 KB)

    Summary form only given. The authors define formally and rationalize a set of policy rules for the propagation of authentication trust across realm boundaries. The use of these rules helps limit global security exposures that ensue whenever an authentication service is compromised. The authors present the design of a simple, general protocol which satisfies these rules and shares the simplicity an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology (Cat. No.91CH3031-2)

    Publication Year: 1991
    Request permission for commercial reuse | |PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Security on database systems and distributed databases

    Publication Year: 1991, Page(s):219 - 220
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (96 KB)

    Summary form only given. Four aspects of information security on database systems are discussed: confidentiality (ensuring information is not subject to unauthorized disclosure); integrity (ensuring information is not subject to unauthorized and undetected modification); inference (ensuring information cannot be deduced from observable); and authentication (ensuring that the invokee of the message... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An authenticate processing for the information system in Industrial Technology Research Institute

    Publication Year: 1991, Page(s):59 - 67
    Cited by:  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (328 KB)

    A technique for storing, processing, and transmitting highly sensitive information over a computer network in the Industrial Technology Research Institute's application system is described. Both secrecy information and user passwords for accessing this information are encrypted by using the public key cryptosystem of the RSA (River-Shamir-Adleman) scheme and El Gamal public key cryptosystem. Based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic authentication of passwords

    Publication Year: 1991, Page(s):126 - 130
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (320 KB)

    A password authentication scheme based on El Gamal's (1985) public key cryptosystem and signature scheme is proposed. This scheme permits each user to choose passwords and identities individually. The password is used as the user's secret key. Using the users public key and identity, the computer system can generate a set of test patterns and store them in a verification table. In the test pattern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A randomness conserved exponential mapping of a GF(q) m-sequence

    Publication Year: 1991, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (264 KB)

    Proposes an exponential nonlinear mapping of the maximum length sequence (M-sequence) over GF(q) which not only increases the linear complexity but also conserves the randomness and period length of the input sequence. For the properly chosen exponent of the exponential operation one-to-one mapping can be obtained to keep the balance, run, and long period properties of the input sequence.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Live scan fingerprint imagery using high resolution C-scan ultrasonography

    Publication Year: 1991, Page(s):88 - 95
    Cited by:  Papers (2)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (456 KB)

    High-frequency ultrasound is proposed as a means for performing live scan fingerprint imagery. Fundamental ultrasonic imaging concepts and their relationship to imaging the ridge structure of the finger are discussed. The ability to obtain an image of the fingerprint using ultrasound is based on the acoustical impedance difference between human tissue (i.e. a ridge) and air (i.e. a valley). This a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure communication networks based on the public-key cryptosystem in GF(2m)

    Publication Year: 1991, Page(s):120 - 125
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (424 KB)

    The application of the Massey-Omura lock (MOL) to obtain data encryption and digital signatures in intelligent networks is discussed. MOL is a mathematical padlock based on field exponentiation in GF(2m) with normal basis representation. If a special mathematical MOL processor is available, the encryption-decryption rate can be accelerated significantly. Recent results on the analysis a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Yet another approach for secure broadcasting based upon single key concept

    Publication Year: 1991, Page(s):47 - 54
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (312 KB)

    Proposes a cryptosystem to solve the problem of broadcasting in a network. The cryptosystem has the following advantages: (1) only one ciphertext is sent out; (2) the operation of enciphering is performed only once; (3) the keys which are held by each user are the same as those of a public key cryptosystem: (4) the length of ciphertext is shorter than that previously proposed; (5) the sender can a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A topology-based matching algorithm for fingerprint authentication

    Publication Year: 1991, Page(s):84 - 87
    Cited by:  Papers (16)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (284 KB)

    A proper representation of the ridge pattern on a fingerprint is addressed. The representation must be such that it supports fingerprint matching. A nonink fingerprint input device using an optical prism is considered. A ridge pattern based on a structural model of minutiae is developed. Finally, a fingerprint matching method via tree matching is given. This method is shown to be invariant under t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive IIR filter in frequency domain and its application

    Publication Year: 1991, Page(s):290 - 295
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (312 KB)

    An adaptive IIR (infinite impulse response) filter in the frequency domain is proposed. This structure may detect every incoming noisy sinusoid in a relatively short period of time. It can also be constructed as a multiple notch filter. Simulation shows that its performance is good enough, even though the desired signal and jammer appear at both the reference and the primary inputs. This result ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of spectrum-techniques-based stream ciphers

    Publication Year: 1991, Page(s):116 - 119
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (232 KB)

    Summarizes some spectrum-techniques-based analyses of some stream ciphers. The correlation analyses of some stream ciphers are discussed, and two BAA approaches to the cryptanalysis of some stream ciphers are presented. Some measurement indexes on the security of stream ciphers derived from some spectrum-techniques-based cryptanalyses are summarized. These indexes include the correlation-immune or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New challenges for telephone companies to secure switching systems

    Publication Year: 1991, Page(s):41 - 46
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (468 KB)

    Describes typical operations channels for a circuit switch and the generic requirements that should be met to secure these channels. The author discusses the technical analysis of these features, and the major results obtained from analyses of circuit switches produced by various vendors. The general technological trend in switch design has been to incorporate a flexible architecture that allows a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • `The digital doorkeeper'-automatic face recognition with the computer

    Publication Year: 1991, Page(s):77 - 83
    Cited by:  Papers (2)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (684 KB)

    The problem of automatic face recognition is investigated. A multiresolution representation of the scene is scanned with a matched filter based on local orientation for the reliable localization of human faces. For the identification of the faces, two complementary strategies are used. At low resolution, the three most important features of a face (head, eye pairs, and nose/mouth/chin) are compare... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The mass spectrometric analysis of drugs and metabolites in urine

    Publication Year: 1991, Page(s):246 - 252
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (200 KB)

    A mass spectrometric analysis of MA (methamphetamine) was performed. Quantities of MA were determined by the selected ion monitoring (SIM) and selected reaction monitoring (SRM) techniques. The limits of detection of MA standard solution and MA in urine are discussed. The limit of detection of MA is less than 1 ng. A urine sample can be analyzed directly without pretreatment procedures. The time r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction of great seismic waves by gravitational wave detectors. II. Noise and sensitivity of detectors

    Publication Year: 1991, Page(s):285 - 289
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (296 KB)

    The prediction of a large seismic wave can be done according to gravitational field turbulence, which travels at the speed of light. The authors describe the sensitivity and noise of the corresponding gravitational wave detector. When an earthquake has a magnitude of seven, the gravitational deviation induces a detectable strain in the antenna bar. Accordingly, seismic waves can be detected by a g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement of static and dynamic calligraphic features

    Publication Year: 1991, Page(s):110 - 115
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (480 KB)

    The application of optical character recognition techniques to calligraphic text is examined. Calligraphic material was scanned with a conventional image scanner and the resulting images were segmented into lines of text consisting of individual symbols or characters. A novel segmentation process yielded identifying features which were fed to a neural network processor. After a training period. th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Axytrans HDS-secure transport of money and valuables, protected by information technology

    Publication Year: 1991, Page(s):29 - 35
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (340 KB)

    Using advanced techniques provided by information technology, especially authentication techniques using industrial cryptography. the Axytrans system provides protected transport of money and valuables. Making transported goods worthless but identifiable, makes physical violence useless and saves lives. The Axytrans hold-down system (HDS) has been chosen by the Belgian PTT for their money transpor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effect of American network news coverage on the Gulf War on public opinion and security

    Publication Year: 1991, Page(s):226 - 230
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (368 KB)

    Military security of news coverage in the Persian Gulf War was the most restrictive in modern warfare. The author argues that American commercial networks and the American public were willing participants in the Pentagon's plan to promote a bloodless war. It is contended that the journalists in the field faced two obstacles: censorship by military restrictions and a network hierarchy that promotes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Threshold identification

    Publication Year: 1991, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (224 KB)

    In many applications, one needs to identify a user's organization rather than his individual identity. A threshold identification scheme is a scheme in which the proof of the group identity can be identified if the members in the group who agree to prove their group identity anonymously is larger than tg(⩽n, the total number of the members). In this paper, the authors propose a thre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A non-lethal high-voltage intelligent intrusion sensor

    Publication Year: 1991, Page(s):304 - 307
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (272 KB)

    Presents a nonlethal high-voltage intelligent intrusion detection sensor for perimeter alarm systems. The sensor looks like a conventional high-voltage electric net barrier. It is a kind of outdoor detection system, and functions not only as a fearsome obstacle but also as an intrusion detector. The alarm detection algorithm, which classifies the sensor readings into three levels (alarm, uncertain... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Current best practice against computer viruses

    Publication Year: 1991, Page(s):261 - 270
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (788 KB)

    Summarizes research on viruses and defenses. The author examines the state-of-the-art in virus defense today and describes how normal computing activities can proceed without undue risk of substantial viral harm. He then describes a set of redundant integrity protection mechanisms used in defending against computer viruses in untrusted computing environments. They include applications of coding th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security subsystems application/evaluation guide in General Services Administration

    Publication Year: 1991, Page(s):235 - 245
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (628 KB)

    The US General Services Administration (GSA) provides physical security systems at GSA facilities to protect against burglary, theft, sabotage, espionage and attack. The security systems program entails systems analysis, design, installation and maintenance in GSA's facilities by engineers and technicians. GSA's physical security philosophy is to increase the time required to gain unauthorized acc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The discrimination of vowels by computers

    Publication Year: 1991, Page(s):315 - 318
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (116 KB)

    The voice control of automated machines is addressed. The author applies the periodical property of vowels and uses the Fourier-transform method to discriminate vowels according to their significant frequencies. An analog-digital interface card is used to convert the sound wave into digital data. The spectrum of several vowels is displayed and discriminated View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The proposed self-scanned array IR sensor based upon pyroelectric elements

    Publication Year: 1991, Page(s):281 - 284
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (164 KB)

    Examines some proposed configurations of pyroelectric sensor arrays scanned either by a CCD (charge-coupled device) structure or by the matrix approach. The pyroelectric array sensor is based on a single-crystal pyroelectric plate (LiTaO3) covered by an array of electrodes created by photolithography. The proposed approach has been experimentally verified by a mathematical model and by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.