By Topic

Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083)

23-25 Oct. 2000

Filter Results

Displaying Results 1 - 25 of 43
  • Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 15
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • False alarm estimation in an automated fingerprint identification system (AFIS)

    Publication Year: 2000, Page(s):260 - 261
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    Law enforcement uses automated fingerprint identification systems (AFIS) to identify people who are reported missing, wanted, or who require background investigation. AFIS employ automated searches of fingerprint features in feature databases. The feature records have relational links to other descriptive information. Quantitative AFIS evaluation includes measurement of missed detection (Type I) a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The RADAR Flashlight three years later: an update on developmental progress

    Publication Year: 2000, Page(s):257 - 259
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    The RADAR Flashlight was developed to be a law enforcement tool. It can detect the respiration signature of a motionless individual standing up to 5 meters behind a 20 centimeter hollow core concrete block wall. Wooden doors typical of those found on most homes are almost transparent to the system. Dry plywood, particle board and wall board do not attenuate the signal significantly. Most system ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote detection of deception using radar vital signs monitor technology

    Publication Year: 2000, Page(s):170 - 173
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    Traditional lie detector testing requires the subject to be physically attached to a variety of sensors. This is impractical for scenarios such as checkpoints where a large number of individuals are entering at a high rate, forcing other methods to be employed. Currently, checkpoint officers must make a quick decision to determine if an individual is being deceptive, and if in turn they should be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Electronic Post Office

    Publication Year: 2000, Page(s):251 - 256
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    This paper describes the Secure Electronic Post Office (SEPO), a new electronic mail (e-mail) system that provides authentication, authorization, secure communications, pipeline, multiple receiver, anti-reply attack, assurance of message reception and routing control. SEPO is easy to implement, cross-platform, to build a regional or global e-mail system. For the internationalization purpose, the e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge management in industry and government: the conflict between security and knowledge sharing

    Publication Year: 2000, Page(s):160 - 169
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    Today the trend in both industry and government is to establish electronic knowledge management systems based upon trust and sharing that connect thousands of users. Corporations are linking as many as 85,000 employees, supplying them with information at their desktops. Connecting all Department of Energy facilities involves over 100,000 people. While electronic security problems in industry can p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The sharing session key component (SSKC) algorithm for end-to-end secure wireless communication

    Publication Year: 2000, Page(s):242 - 250
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    With the growth of the wireless market, value-added services and applications are increasing rapidly. WAP (Wireless Application Protocol) provides a platform to access real-time information, including news reports, stock fluctuations, mobile banks, e-commerce and browse the Internet at any time, anywhere. For current devices with lower power and finite computing capability, it is not suitable to e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical 2D correlation identification in security applications: discussion

    Publication Year: 2000, Page(s):119 - 123
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    The optical method JTC (2D correlation) is a very efficient tool in the field of possible identification approaches. Originally suggested by Weaver and Goodman (1966) the JTC concept has been widely applied and many modifications has appeared during last years. The practical implementation is strongly limited by a sensitivity of correlation peak value to possible distortions and artifacts. The pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Laser based explosives detection

    Publication Year: 2000, Page(s):207 - 217
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    Transport Canada (TC) and the Federal Aviation Administration (FAA) have been active players in the research and development of trace explosive detection systems (TEDS). Under the direction of TC, private industry has been asked to develop devices meeting more and more stringent criteria. The recent development of a specification for TEDS by TC will provide industry with a clear blueprint for deve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technical considerations in site access management systems

    Publication Year: 2000, Page(s):77 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    Site Access Management Systems (SAM) within the UK have evolved throughout the 90's, utilising increasingly more powerful and sophisticated hardware, more advanced communications services, and more effective software, thus providing improved user interfaces and better data/image handling characteristics. The requirement for SAMS in secure establishments came about from a desire to increase the act... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of an on-the-job training mastery test

    Publication Year: 2000, Page(s):197 - 200
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB)

    The effectiveness of the national aviation security system is highly dependent upon people, especially those employed as checkpoint screeners. The training of these individuals is critical to their performance on the job (K. Moore, 1991). The Federal Aviation Administration (FAA) is very interested in enhancing screener training and further improving their readiness for the job. The FAA's aviation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electrostatic field detectors, the seaside and the desert wind?

    Publication Year: 2000, Page(s):151 - 159
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    In the early 1960's the first ideas were developed by leading companies in Germany (Siemens, Wachtel, etc) to design an intrusion detection system following a capacitance measurement principle. The first detection electronics and set-ups were designed for indoor use (jewellery shops, museums, etc..) but in 1964 the first capacitive detectors for outdoor use i.e. perimeter security systems appeared... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A 6805-based security system for broadcasting stock information

    Publication Year: 2000, Page(s):238 - 241
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    This research describes the design and implementation of secure stock information broadcasting systems using Motorola's 68HC05B6 single-chip microcontroller as the embedded security devices. In-band technology is used to transparently insert encrypted stock information into TV channel(s) and send to households. The implemented conditional-access system uses the Data Encryption Standard (DES) and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assisting the UK government's CCTV initiative

    Publication Year: 2000, Page(s):113 - 118
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    The paper discusses the technology being used in a UK Government initiative under which £153m is being made available to “crime reduction partnerships” in England and Wales to install CCTV in public areas. The aim is to reduce crime and the fear of crime. So far, the Government has awarded a total of £33m to more than 180 schemes. The perception in Government circles is tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BioIS study. Comparative study of biometric identification systems

    Publication Year: 2000, Page(s):60 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    On 1st April 1999, work on the a.m. BioIS Study commenced. This study was initiated by the Federal Criminal Investigation Office of Germany (BKA) in close cooperation with the German Information Security Agency (BSI). The study includes a field investigation, in which 11 physiological (static) and behaviour-specific (dynamic) systems, which were available and supported in Germany, were installed a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fire detection with temperature sensor arrays

    Publication Year: 2000, Page(s):262 - 268
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    We show how to locate a fire in a closed room by an array of sophisticated temperature sensors. Solving this problem enables not only the automatic fire extinguishing in buildings such as museums, warehouses, shopping malls, computer rooms, etc., but also a better understanding of the causes of fire. Consequently, this approach might be also very useful for fire prevention and fire detection View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usability assessment of a bottle content tester for use in airports by screeners

    Publication Year: 2000, Page(s):174 - 177
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    Explosives may be concealed as a liquid or slurry in bottles in carry-on or checked baggage. To alleviate the uncertainty associated with screening liquid containers, devices are currently in development to screen bottles. These bottle-screening devices will provide a mechanism for airport security personnel to quickly and precisely examine liquids in bottles. Currently, airport security personnel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CATV - interactive security and communication system

    Publication Year: 2000, Page(s):124 - 136
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    The areas of television, telecommunication, and information technology are converging, new application areas are arising and new services are being established. Aside from the traditional delivery channels, computer networks play an increasing role in providing the new services. An important part of these services is based on video. However, in order to develop and establish such services, the dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of Blast/FX, an explosive effects analysis software tool

    Publication Year: 2000, Page(s):218 - 221
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Recent events have highlighted the threat posed by terrorist bombings. To address these evolving security concerns, the FAA identified the need to have an improved capability to assess the effects of explosions against civil aviation facilities and their occupants. For many engineers and security specialists, the need to assess the risks to buildings from explosions represents a new and often impo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aggressive lighting [security]

    Publication Year: 2000, Page(s):84 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB)

    A review of glare lighting systems installed on UK Government sites has identified that there were inconsistencies between installations. This prompted the study on which the paper is based. The idea of using bright light shining outwards from a secure perimeter as an aid to security is not new. The lighting is intended to provide a glare field which inhibits persons approaching the site from perc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automated detection system for large vehicle-bombs

    Publication Year: 2000, Page(s):201 - 206
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    The Large Vehicle-Bomb Detection System (LVBDS), an automated drive-through system capable of detecting and identifying several explosive and taggant materials, is described. LVBDS is a fully automatic system, integrating trace chemical explosives detection with access control and video monitoring components to assist in the identification of a vehicle and driver. Although it is readily adaptable ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operational requirements for security measures

    Publication Year: 2000, Page(s):64 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Many physical and procedural security measures have not met users' needs because the implications of what is required have not been fully thought through. An operational requirement is a statement of needs based upon a thorough and systematic assessment of the problems to be solved and the hoped for outcomes. It should provide the link between a high level need and the system procurement process. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Line-scan imaging for the positive identification of ballistics specimens

    Publication Year: 2000, Page(s):269 - 275
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    The identification of firearms from forensic ballistics specimens is an exacting and intensive activity performed by specialists with extensive experience. The introduction of imaging technology to assist the identification process of firearms has enhanced the ability of forensic ballisticians to analyse the specimens. This paper describes a development in the application of imaging technology for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Screener threat detection performance with three dimensional X-ray imaging

    Publication Year: 2000, Page(s):178 - 191
    Cited by:  Papers (2)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    The paper covers the test and evaluation of screener performance using three-dimensional (3D) X-ray presentation versus the conventional two-dimensional (2D) X-ray projection. The application of 3D imaging is currently being used in the medical and environmental industry. Just recently, 3D imaging has been applied to X-ray machines for aviation security. In particular the AXis 3DTM was ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.