By Topic

Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186)

16-19 Oct. 2001

Filter Results

Displaying Results 1 - 25 of 45
  • Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186)

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (219 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s): 17
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Adding security and privacy to agents acting in a marketplace: a trust model

    Publication Year: 2001, Page(s):235 - 239
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB)

    A general trust model for secure electronic agent-based marketplaces is described. The trust is presented as a dimensional space covering from physical security to high level trust relationships. A specific scenario has been chosen to show an implementation of the trust model: a secure multi-agent marketplace designed to manage resources in future mobile communications networks (J. Bigham et al., ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of protocol for e-voting on the Internet

    Publication Year: 2001, Page(s):180 - 189
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    The paper proposes a practical anonymous secure electronic voting protocol in which the communications are based on the Internet. This protocol employs blind signature to ensure that only eligible registered voters can participate in the election activity, and each eligible registered voter can securely vote at most once. This protocol, with secret sharing methods, prevents any facility from falsi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-dimensional cluster analysis of class characteristics for ballistics specimen identification

    Publication Year: 2001, Page(s):115 - 121
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB)

    The characteristic markings on the cartridge and projectile of a bullet fired from a gun can be recognised as a "fingerprint" for identification of the firearm. Over thirty different features within these markings can be distinguished, which in combination produce a "fingerprint" for identification of a firearm. The analysis of marks on cartridge casings and projectiles that have been fired, provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One-time installation with traitors tracing for copyright programs

    Publication Year: 2001, Page(s):149 - 155
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    We propose an innovative software protection scheme by using smart cards. By the use of this scheme, a buyer can purchase software, from a merchant on the Internet, using his (or her) smart card. The bought software, after downloading from website of the merchant, will be protected in such a way that it can only be installed one time in the buyer's computer. Further, a buyer who redistributed copi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Rijndael block cipher (AES proposal) : a comparison with DES

    Publication Year: 2001, Page(s):229 - 234
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (499 KB)

    In October 2000, after three years of competition between 15 candidate algorithms, the National Standards and Technology (NIST) chose the Rijndael algorithm to be adopted as Advanced Encryption Standard (AES) by the U.S. Department of Commerce, replacing to Data Encryption Algorithm (DES), which has been the standard since 1977. The authors analyze the structure and design of new AES, following th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High confidence recognition of persons by iris patterns

    Publication Year: 2001, Page(s):254 - 263
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (861 KB)

    Algorithms developed by the author for recognizing persons by their iris patterns have now been tested in six field and laboratory trials, producing no false matches in several million comparison tests. The recognition principle is the failure of a test of statistical independence on iris phase structure encoded by multi-scale quadrature wavelets. The combinatorial complexity of this phase informa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outdoor passive millimetre wave security screening

    Publication Year: 2001, Page(s):172 - 179
    Cited by:  Papers (5)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB)

    In short range applications such as the outdoor screening of people for security purposes, passive millimetre wave imaging has several benefits: it is not necessary to artificially irradiate subjects, clothing is transparent, and images have similarities to those obtained visibly. The paper outlines the application of these concepts to security screening. A Ka band mechanically scanned imaging sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Objective and subjective image quality evaluation for security technology

    Publication Year: 2001, Page(s):108 - 114
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (929 KB)

    The paper is devoted to the impacts of image compression algorithms on security image data. It compares three fundamentally different evaluation techniques of image objective criteria, subjective criteria and identification. We have selected two typical security image data (a car plate and a face) with different initial quality and we applied three different compression techniques-two professional... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recent development of fiber optic sensors for perimeter security

    Publication Year: 2001, Page(s):142 - 148
    Cited by:  Papers (1)  |  Patents (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB)

    Outdoors fiber optic disturbance sensors are, now used for perimeter security and were presented at Carnahan Conference in London in 1995 by I.R. Hawkes and Griffiths. The fibre optic interferometer sensor in a Sagnac loop configuration has also been known as a product of Mason and Manson Company since 1994. This paper describes the investigation results of the new generation of the fiber optic pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FRIARS: a feedback control system for information assurance using a Markov decision process

    Publication Year: 2001, Page(s):223 - 228
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    The authors describe a prototype cyber-defense decision system for autonomously reacting to system attacks by using a Markov Decision Process (MDP), a simple game, and a weighted random culling from select actuators. The system is novel in that the amount of knowledge engineering to build the system is minimal, consisting of knowing the approximate false alarm rate of each of the sensors, the prob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer assistance to communication and co-ordination during emergencies

    Publication Year: 2001, Page(s):42 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB)

    The authors have been involved in crisis management for many years, in the armed forces, in industry and as consultants in crisis and media management, and have been part of a. large number of exercises and live incidents. Experience has shown that the elements of response to an incident that are often fatally weak are communication and co-ordination, without which no individual or team can be tru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fingerprint verification using smart cards for access control systems

    Publication Year: 2001, Page(s):250 - 253
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB)

    During the last years, the authors have been trying to integrate biometrics inside a smart card. In order to improve the error rates obtained with hand geometry biometrics, and the cost involved with iris recognition systems, fingerprints will be used. This technique, quite well known in the industry and deeply studied in the last century, have improved its electronic sensors, pulling down the pri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification of security constraint in UML

    Publication Year: 2001, Page(s):163 - 171
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (542 KB)

    In recent years various initiatives for solving the problem of security in databases have arisen. However, all of them have been only partial solutions which resolved isolated problems. Consequently, a global solution to the problem has not been reached yet. We believe that a methodological approach in which security is taken into consideration from the earliest stages of the development process o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple view dual-energy X-ray imaging

    Publication Year: 2001, Page(s):103 - 107
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB)

    This paper introduces a multiple view X-ray line-scan imaging technique for the screening of carry-on-luggage and hold cargo encountered in aviation security. The three-dimensional information inherent in the resultant perspective images can be visualised as a smooth object rotation on a video display monitor. It has also been demonstrated that this rotational effect can be incorporated into a dyn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrepid monostatic microwave radar putting ranging back into radar

    Publication Year: 2001, Page(s):136 - 141
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    The Intrepid Digital Transceiver operates at K-band similar to the digital bistatic microwave. It shares the same antenna that is designed to have a very narrow beam width but with a special vertical pattern to detect the crawling intruder at close range. It uses logarithmic amplifiers to compress the dynamic range of the Doppler responses. The paper describes the system concept, the hardware, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elliptic curve cryptosystems on smart cards

    Publication Year: 2001, Page(s):213 - 222
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB)

    The use of public-key cryptosystems (PKC) received considerable attention. They are beneficial in encryption as well as signing which play an essential role in electronic banking and financial transactions. Elliptic Curve Cryptography (ECC) is one of best public key techniques because of its small key size and high security. Secure applications in smart cards present implementation challenges part... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to security engineering

    Publication Year: 2001, Page(s):34 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (679 KB)

    Security engineering is often brushed over during the planning phase for many government and industrial installations, even though there may be a very real threat. When considered, the usual solution has been to develop a security measure that addresses the threat as defined by the last successful attack and not the whole threat capability. A selection of case histories, military and civilian, sug... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Home security system and CATV

    Publication Year: 2001, Page(s):293 - 306
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (903 KB)

    The areas of television, telecommunication, and information technology are converging, new application areas are being arising and new services are being and other multimedia services. established. Aside from the traditional delivery channels, computer networks play an increasing role in providing the new services. An important part of these services is based on video. However, in order to develop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test and evaluation for determining screener training effectiveness

    Publication Year: 2001, Page(s):96 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB)

    For many years, the only FAA-approved checkpoint screener-training program was a classroom lecture developed by the Air Transport Association. In April 1997, the FAA also approved the use of a Computer-Based Training (CBT) program for initial screener training prior to on-the-job training. This study describes a comprehensive test and evaluation of four training programs currently in use at US air... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using classifiers to predict linear feedback shift registers

    Publication Year: 2001, Page(s):240 - 249
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    Previously (J.C. Hernandez et al., 2000), some new ideas that justify the use of artificial intelligence techniques in cryptanalysis are presented. The main objective of that paper was to show that the theoretical next bit prediction problem can be transformed into a classification problem, and this classification problem could be solved with the aid of some AI algorithms. In particular, they show... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Printers are dangerous

    Publication Year: 2001, Page(s):190 - 196
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB)

    In the last years, many new intelligent full-featured peripherals that assist information systems have appeared. Those peripherals, such as printers, copiers, PDA organizers, Web cameras, etc. usually have a very friendly way of configuration and management (via http, ftp or telnet servers) and offer more networked services everyday. Their computation, memory and networking capabilities have also ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Historical alarm and near-realtime facility data analysis

    Publication Year: 2001, Page(s):122 - 127
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB)

    This paper describes the current effort to analyze historical alarm data and discusses applications and methods for secure, near-realtime communications of data. The objective of analyzing historical alarm data is to determine if trends in system or subsystem performance can be detected that may affect system maintenance activities and operational costs. A wealth of data is potentially available, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure information by using digital data embedding and spread spectrum techniques

    Publication Year: 2001, Page(s):156 - 162
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (537 KB)

    Since most data transmission is transmitted via public media, the security of information is thus very important, especially for such confidential data. Currently, most security systems own their particular protocol. When they are used via public networks, they will attract the attention and interest of hackers. Data embedding is one of the solutions to remedy this problem. The benefits of utilizi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.