Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186)

16-19 Oct. 2001

Filter Results

Displaying Results 1 - 25 of 45
  • Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186)

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (219 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s): 17
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • One-time installation with traitors tracing for copyright programs

    Publication Year: 2001, Page(s):149 - 155
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB)

    We propose an innovative software protection scheme by using smart cards. By the use of this scheme, a buyer can purchase software, from a merchant on the Internet, using his (or her) smart card. The bought software, after downloading from website of the merchant, will be protected in such a way that it can only be installed one time in the buyer's computer. Further, a buyer who redistributed copi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handwritten signatures recognizer by its envelope and strokes layout using HMM's

    Publication Year: 2001, Page(s):267 - 271
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB)

    A method for the automatic recognition of offline handwritten signatures using both global and local features is described. As global features, we use the envelope of the signature sequenced as polar coordinates; and as local features we use points located inside the envelope that describe the density or distribution of signature strokes. Each feature is processed as a sequence by a hidden Markov ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minutiae detection algorithm for fingerprint recognition

    Publication Year: 2001, Page(s):264 - 266
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB)

    Amongst the main innovation prospects within the so called information society, and in the framework of future communications systems, we find the design of database-access integral services, e-commerce and communication systems, together with remote control of terminals and devices, are all the result of global services derived from last generation integration of mobile telephony and Internet. So... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to security engineering

    Publication Year: 2001, Page(s):34 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (679 KB)

    Security engineering is often brushed over during the planning phase for many government and industrial installations, even though there may be a very real threat. When considered, the usual solution has been to develop a security measure that addresses the threat as defined by the last successful attack and not the whole threat capability. A selection of case histories, military and civilian, sug... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advantages of a low impedance linear magnetic microphonic sensor cable

    Publication Year: 2001, Page(s):307 - 311
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    This paper describes the advantages of a linear magnetic sensor cable designed specifically to detect intruders/escapees as they attempt to gain access to, or escape from, secure areas. This sensor cable has been deployed in a large variety of security applications with over 4 million metres of this cable installed in more than 35 different countries. The technical and operational benefits of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High confidence recognition of persons by iris patterns

    Publication Year: 2001, Page(s):254 - 263
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (861 KB)

    Algorithms developed by the author for recognizing persons by their iris patterns have now been tested in six field and laboratory trials, producing no false matches in several million comparison tests. The recognition principle is the failure of a test of statistical independence on iris phase structure encoded by multi-scale quadrature wavelets. The combinatorial complexity of this phase informa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of automatic number plate recognition reading in managing access to the boots company headquarter site

    Publication Year: 2001, Page(s):52 - 53
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB)

    The paper presents the rationale for The Boots Company's decision to reduce the level of manned guarding at the access points to it's headquarter site and introduce automatic number plate recognition (ANPR) technology as it's primary means of control of entry View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The management of threat events

    Publication Year: 2001, Page(s):27 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB)

    Events which threaten life, property, the community or the environment, make particular demands, both financial and human, on those responsible for decision making when controlling and co-ordinating resources in response to those events. Technology is now able to provide us with a computer representation of the real world, rather than having to rely upon real exercises. This allows decision-makers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Home security system and CATV

    Publication Year: 2001, Page(s):293 - 306
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (903 KB)

    The areas of television, telecommunication, and information technology are converging, new application areas are being arising and new services are being and other multimedia services. established. Aside from the traditional delivery channels, computer networks play an increasing role in providing the new services. An important part of these services is based on video. However, in order to develop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Historical alarm and near-realtime facility data analysis

    Publication Year: 2001, Page(s):122 - 127
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB)

    This paper describes the current effort to analyze historical alarm data and discusses applications and methods for secure, near-realtime communications of data. The objective of analyzing historical alarm data is to determine if trends in system or subsystem performance can be detected that may affect system maintenance activities and operational costs. A wealth of data is potentially available, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of protocol for e-voting on the Internet

    Publication Year: 2001, Page(s):180 - 189
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    The paper proposes a practical anonymous secure electronic voting protocol in which the communications are based on the Internet. This protocol employs blind signature to ensure that only eligible registered voters can participate in the election activity, and each eligible registered voter can securely vote at most once. This protocol, with secret sharing methods, prevents any facility from falsi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fingerprint verification using smart cards for access control systems

    Publication Year: 2001, Page(s):250 - 253
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB)

    During the last years, the authors have been trying to integrate biometrics inside a smart card. In order to improve the error rates obtained with hand geometry biometrics, and the cost involved with iris recognition systems, fingerprints will be used. This technique, quite well known in the industry and deeply studied in the last century, have improved its electronic sensors, pulling down the pri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • m-security (security and mobile telephony)

    Publication Year: 2001, Page(s):76 - 84
    Cited by:  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    This paper shows a view of the relationship, now closer than ever, between mobile telephony and security. The paper focuses on this relationship as it stands at the moment with regard to its functional nature and the technology involved, and how the relationship will vary in the very near future, when forthcoming technologies will improve and refine the performance of this communication resource. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-resolutional face verification system via filter-based integration

    Publication Year: 2001, Page(s):278 - 281
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB)

    The authors build up a face verification system via multi-resolutional features to identify individuals. In such a system, three fold requirements, including personalization, integration, and adaptive thresholding, should be considered in order to to achieve more accuracy. In order to satisfy the above requirements, R personal feature spaces, an optimal positive Boolean function, and an automatica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secured by design - learning from the past to secure the future!

    Publication Year: 2001, Page(s):45 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    The Secured by Design (SBD) scheme is a United Kingdom police crime prevention initiative in which the police inspect building designs and recommend actions to 'prevent crime'. If those recommended actions are implemented, the scheme is awarded the police SBD logo that suggests the buildings are approved by the police as being secure. The scheme has been in operation for over a decade and has tend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • U.S. Department of Energy security technologies

    Publication Year: 2001, Page(s):19 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (506 KB)

    The U.S. Department of Energy (DOE) has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than 40 years. Basic security system engineering concepts are still valid, but the details of the system at DOE facilities must constantly be updated to respond to the escalating terrorist threat and the need to replace aging components and systems. The mission ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrepid monostatic microwave radar putting ranging back into radar

    Publication Year: 2001, Page(s):136 - 141
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    The Intrepid Digital Transceiver operates at K-band similar to the digital bistatic microwave. It shares the same antenna that is designed to have a very narrow beam width but with a special vertical pattern to detect the crawling intruder at close range. It uses logarithmic amplifiers to compress the dynamic range of the Doppler responses. The paper describes the system concept, the hardware, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test and evaluation for determining screener training effectiveness

    Publication Year: 2001, Page(s):96 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB)

    For many years, the only FAA-approved checkpoint screener-training program was a classroom lecture developed by the Air Transport Association. In April 1997, the FAA also approved the use of a Computer-Based Training (CBT) program for initial screener training prior to on-the-job training. This study describes a comprehensive test and evaluation of four training programs currently in use at US air... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to distinguish between a block cipher and a random permutation by lowering the input entropy

    Publication Year: 2001, Page(s):289 - 292
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is explained. Additionally, we propose a genetic algorithm based implementation and show some preliminary results of these ideas on reduced rounds versions of the block cipher TEA View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple view dual-energy X-ray imaging

    Publication Year: 2001, Page(s):103 - 107
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB)

    This paper introduces a multiple view X-ray line-scan imaging technique for the screening of carry-on-luggage and hold cargo encountered in aviation security. The three-dimensional information inherent in the resultant perspective images can be visualised as a smooth object rotation on a video display monitor. It has also been demonstrated that this rotational effect can be incorporated into a dyn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-dimensional cluster analysis of class characteristics for ballistics specimen identification

    Publication Year: 2001, Page(s):115 - 121
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB)

    The characteristic markings on the cartridge and projectile of a bullet fired from a gun can be recognised as a "fingerprint" for identification of the firearm. Over thirty different features within these markings can be distinguished, which in combination produce a "fingerprint" for identification of a firearm. The analysis of marks on cartridge casings and projectiles that have been fired, provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outdoor passive millimetre wave security screening

    Publication Year: 2001, Page(s):172 - 179
    Cited by:  Papers (5)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB)

    In short range applications such as the outdoor screening of people for security purposes, passive millimetre wave imaging has several benefits: it is not necessary to artificially irradiate subjects, clothing is transparent, and images have similarities to those obtained visibly. The paper outlines the application of these concepts to security screening. A Ka band mechanically scanned imaging sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using classifiers to predict linear feedback shift registers

    Publication Year: 2001, Page(s):240 - 249
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    Previously (J.C. Hernandez et al., 2000), some new ideas that justify the use of artificial intelligence techniques in cryptanalysis are presented. The main objective of that paper was to show that the theoretical next bit prediction problem can be transformed into a classification problem, and this classification problem could be solved with the aid of some AI algorithms. In particular, they show... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.