By Topic

Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083)

23-25 Oct. 2000

Filter Results

Displaying Results 1 - 25 of 43
  • Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 15
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Fire detection with temperature sensor arrays

    Publication Year: 2000, Page(s):262 - 268
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    We show how to locate a fire in a closed room by an array of sophisticated temperature sensors. Solving this problem enables not only the automatic fire extinguishing in buildings such as museums, warehouses, shopping malls, computer rooms, etc., but also a better understanding of the causes of fire. Consequently, this approach might be also very useful for fire prevention and fire detection View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • False alarm estimation in an automated fingerprint identification system (AFIS)

    Publication Year: 2000, Page(s):260 - 261
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    Law enforcement uses automated fingerprint identification systems (AFIS) to identify people who are reported missing, wanted, or who require background investigation. AFIS employ automated searches of fingerprint features in feature databases. The feature records have relational links to other descriptive information. Quantitative AFIS evaluation includes measurement of missed detection (Type I) a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The RADAR Flashlight three years later: an update on developmental progress

    Publication Year: 2000, Page(s):257 - 259
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    The RADAR Flashlight was developed to be a law enforcement tool. It can detect the respiration signature of a motionless individual standing up to 5 meters behind a 20 centimeter hollow core concrete block wall. Wooden doors typical of those found on most homes are almost transparent to the system. Dry plywood, particle board and wall board do not attenuate the signal significantly. Most system ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Screener threat detection performance with three dimensional X-ray imaging

    Publication Year: 2000, Page(s):178 - 191
    Cited by:  Papers (2)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    The paper covers the test and evaluation of screener performance using three-dimensional (3D) X-ray presentation versus the conventional two-dimensional (2D) X-ray projection. The application of 3D imaging is currently being used in the medical and environmental industry. Just recently, 3D imaging has been applied to X-ray machines for aviation security. In particular the AXis 3DTM was ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Electronic Post Office

    Publication Year: 2000, Page(s):251 - 256
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    This paper describes the Secure Electronic Post Office (SEPO), a new electronic mail (e-mail) system that provides authentication, authorization, secure communications, pipeline, multiple receiver, anti-reply attack, assurance of message reception and routing control. SEPO is easy to implement, cross-platform, to build a regional or global e-mail system. For the internationalization purpose, the e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CATV - interactive security and communication system

    Publication Year: 2000, Page(s):124 - 136
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    The areas of television, telecommunication, and information technology are converging, new application areas are arising and new services are being established. Aside from the traditional delivery channels, computer networks play an increasing role in providing the new services. An important part of these services is based on video. However, in order to develop and establish such services, the dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usability assessment of a bottle content tester for use in airports by screeners

    Publication Year: 2000, Page(s):174 - 177
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    Explosives may be concealed as a liquid or slurry in bottles in carry-on or checked baggage. To alleviate the uncertainty associated with screening liquid containers, devices are currently in development to screen bottles. These bottle-screening devices will provide a mechanism for airport security personnel to quickly and precisely examine liquids in bottles. Currently, airport security personnel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The sharing session key component (SSKC) algorithm for end-to-end secure wireless communication

    Publication Year: 2000, Page(s):242 - 250
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    With the growth of the wireless market, value-added services and applications are increasing rapidly. WAP (Wireless Application Protocol) provides a platform to access real-time information, including news reports, stock fluctuations, mobile banks, e-commerce and browse the Internet at any time, anywhere. For current devices with lower power and finite computing capability, it is not suitable to e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical 2D correlation identification in security applications: discussion

    Publication Year: 2000, Page(s):119 - 123
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    The optical method JTC (2D correlation) is a very efficient tool in the field of possible identification approaches. Originally suggested by Weaver and Goodman (1966) the JTC concept has been widely applied and many modifications has appeared during last years. The practical implementation is strongly limited by a sensitivity of correlation peak value to possible distortions and artifacts. The pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote detection of deception using radar vital signs monitor technology

    Publication Year: 2000, Page(s):170 - 173
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    Traditional lie detector testing requires the subject to be physically attached to a variety of sensors. This is impractical for scenarios such as checkpoints where a large number of individuals are entering at a high rate, forcing other methods to be employed. Currently, checkpoint officers must make a quick decision to determine if an individual is being deceptive, and if in turn they should be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Laser based explosives detection

    Publication Year: 2000, Page(s):207 - 217
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    Transport Canada (TC) and the Federal Aviation Administration (FAA) have been active players in the research and development of trace explosive detection systems (TEDS). Under the direction of TC, private industry has been asked to develop devices meeting more and more stringent criteria. The recent development of a specification for TEDS by TC will provide industry with a clear blueprint for deve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A 6805-based security system for broadcasting stock information

    Publication Year: 2000, Page(s):238 - 241
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    This research describes the design and implementation of secure stock information broadcasting systems using Motorola's 68HC05B6 single-chip microcontroller as the embedded security devices. In-band technology is used to transparently insert encrypted stock information into TV channel(s) and send to households. The implemented conditional-access system uses the Data Encryption Standard (DES) and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assisting the UK government's CCTV initiative

    Publication Year: 2000, Page(s):113 - 118
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    The paper discusses the technology being used in a UK Government initiative under which £153m is being made available to “crime reduction partnerships” in England and Wales to install CCTV in public areas. The aim is to reduce crime and the fear of crime. So far, the Government has awarded a total of £33m to more than 180 schemes. The perception in Government circles is tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dramatic resolution enhancement of gamma-ray spectra acquired with cadmium-zinc-telluride detectors via a patented pulse-shape-analysis methodology

    Publication Year: 2000, Page(s):276 - 280
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    We are developing a technique to correct for the resolution-degrading ballistic deficit in cadmium-zinc-telluride (CZT) gamma-ray detectors using our patent-pending pulse-shape analysis methodology. The pulse-shape-analysis methodology has already been demonstrated by LLNL for application in Compton rejection (technology being licensed) and possible application to gamma-ray imaging with Ge-based s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radio frequency-based personnel location systems

    Publication Year: 2000, Page(s):141 - 150
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB)

    This paper presents the technologies available to locate the origin of radio frequency transmissions for Personnel Location Systems. The development and application of these systems will be discussed. A new class of signal strength location systems will be introduced that sets the standard for locating accuracy in indoor and campus environments. Many technologies have been applied to locating radi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge management in industry and government: the conflict between security and knowledge sharing

    Publication Year: 2000, Page(s):160 - 169
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    Today the trend in both industry and government is to establish electronic knowledge management systems based upon trust and sharing that connect thousands of users. Corporations are linking as many as 85,000 employees, supplying them with information at their desktops. Connecting all Department of Energy facilities involves over 100,000 people. While electronic security problems in industry can p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aggressive lighting [security]

    Publication Year: 2000, Page(s):84 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB)

    A review of glare lighting systems installed on UK Government sites has identified that there were inconsistencies between installations. This prompted the study on which the paper is based. The idea of using bright light shining outwards from a secure perimeter as an aid to security is not new. The lighting is intended to provide a glare field which inhibits persons approaching the site from perc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrepid digital microwave: a new approach to bistatic radar

    Publication Year: 2000, Page(s):17 - 21
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    Southwest Microwave Inc. (SMI) introduced the world's first commercially viable bistatic microwave intrusion detection sensor in 1971. Bistatic microwave has become the paradigm for high security perimeters, and SMI products have become industry standards. With the introduction of intrepid digital microwave, SMI brings the latest in digital signal processing (DSP) and power and data networking to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric identification system using a radial basis network

    Publication Year: 2000, Page(s):47 - 51
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    The paper describes an efficient face identification method using a probabilistic neural net. Our system is compared to the method presented at ICCST'99, based on the Karhunen-Loeve transform for feature extraction (reduction of dimensionality of the input image), and a feedforward multilayer perceptron neural net, implemented as a classifier device, that performed the identification process View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction of site access management systems across the defence estate

    Publication Year: 2000, Page(s):71 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    The paper examines the introduction by the UK's Ministry of Defence (MOD) of Site Access Management Systems (SAMS, formerly known as Technical Access Control Systems (TACS)) into the Defence Estate. The MOD's association with SAMS came about as a result of a number of events that focused the attention of the MOD on the need to explore all options to better the security of access, particularly in r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automated detection system for large vehicle-bombs

    Publication Year: 2000, Page(s):201 - 206
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    The Large Vehicle-Bomb Detection System (LVBDS), an automated drive-through system capable of detecting and identifying several explosive and taggant materials, is described. LVBDS is a fully automatic system, integrating trace chemical explosives detection with access control and video monitoring components to assist in the identification of a vehicle and driver. Although it is readily adaptable ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure databases: state of the art

    Publication Year: 2000, Page(s):228 - 237
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    Most of the relational database management systems (RDBMS) used nowadays provide some limited security mechanisms, and facilities offer capabilities to define roles and establish audit trails. Users of RDBMSs are used to working with discretionary access control (DAC) policies. This kind of security is sufficient for a great majority of information systems, however an increasing number of organisa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMETHYST: automatic alarm assessment: operational experience

    Publication Year: 2000, Page(s):107 - 112
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    The aim of the AMETHYST (Automatic Event Authentication Systems) project is to encourage the development of a high-performance perimeter detection system by using video assessment to enhance the Perimeter Intrusion Detection System (PIDS). AMETHYST will automatically assess the cause of all PIDS alarms and pass to an operator only those alarms that are likely to be caused by an intruder. It will t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.