Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186)

16-19 Oct. 2001

Filter Results

Displaying Results 1 - 25 of 45
  • Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186)

    Publication Year: 2001
    Request permission for commercial reuse | |PDF file iconPDF (219 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s): 17
    Request permission for commercial reuse | |PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • One-time installation with traitors tracing for copyright programs

    Publication Year: 2001, Page(s):149 - 155
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (477 KB)

    We propose an innovative software protection scheme by using smart cards. By the use of this scheme, a buyer can purchase software, from a merchant on the Internet, using his (or her) smart card. The bought software, after downloading from website of the merchant, will be protected in such a way that it can only be installed one time in the buyer's computer. Further, a buyer who redistributed copi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification of security constraint in UML

    Publication Year: 2001, Page(s):163 - 171
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (542 KB)

    In recent years various initiatives for solving the problem of security in databases have arisen. However, all of them have been only partial solutions which resolved isolated problems. Consequently, a global solution to the problem has not been reached yet. We believe that a methodological approach in which security is taken into consideration from the earliest stages of the development process o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure information by using digital data embedding and spread spectrum techniques

    Publication Year: 2001, Page(s):156 - 162
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (537 KB)

    Since most data transmission is transmitted via public media, the security of information is thus very important, especially for such confidential data. Currently, most security systems own their particular protocol. When they are used via public networks, they will attract the attention and interest of hackers. Data embedding is one of the solutions to remedy this problem. The benefits of utilizi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rapid data collection at major incident scenes using three dimensional laser scanning techniques

    Publication Year: 2001, Page(s):60 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (639 KB)

    The development of commercial laser scanning hardware/software systems, which are specifically designed for the acquisition and analysis of three dimensional (3D) data, now offers innovative tools for the rapid collection, analysis and interpretation of detailed information at complex and hazardous incident scenes. This paper reviews TRL's use of 3D laser scanning systems at major incident scenes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advantages of a low impedance linear magnetic microphonic sensor cable

    Publication Year: 2001, Page(s):307 - 311
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (328 KB)

    This paper describes the advantages of a linear magnetic sensor cable designed specifically to detect intruders/escapees as they attempt to gain access to, or escape from, secure areas. This sensor cable has been deployed in a large variety of security applications with over 4 million metres of this cable installed in more than 35 different countries. The technical and operational benefits of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of an explosive detection device based on quadrupole resonance (QR) technology in aviation security

    Publication Year: 2001, Page(s):282 - 288
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (410 KB)

    The Federal Aviation Administration has deployed Advanced Technology (AT) based explosive detection devices for screening checked baggage in US domestic airports. The paper addresses the application of quadrupole resonance (QR) technology to detect explosives in checked baggage in aviation security. This technology was deployed in combination with advanced X-ray by the US government. The paper foc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Historical alarm and near-realtime facility data analysis

    Publication Year: 2001, Page(s):122 - 127
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (418 KB)

    This paper describes the current effort to analyze historical alarm data and discusses applications and methods for secure, near-realtime communications of data. The objective of analyzing historical alarm data is to determine if trends in system or subsystem performance can be detected that may affect system maintenance activities and operational costs. A wealth of data is potentially available, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High confidence recognition of persons by iris patterns

    Publication Year: 2001, Page(s):254 - 263
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (861 KB)

    Algorithms developed by the author for recognizing persons by their iris patterns have now been tested in six field and laboratory trials, producing no false matches in several million comparison tests. The recognition principle is the failure of a test of statistical independence on iris phase structure encoded by multi-scale quadrature wavelets. The combinatorial complexity of this phase informa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vehicle barriers - development of a model and standard

    Publication Year: 2001, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (390 KB)

    Vehicle barriers and bollards are widely used to control vehicle access to areas for security, safety or social reasons. Although vehicle barriers may deter the law-abiding and some criminals, many bollards and vehicle barriers can be easily overcome or even dislodged accidentally. The ability of vehicle barriers to resist a deliberate attack has not been exhaustively studied. No nationally, or in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Rijndael block cipher (AES proposal) : a comparison with DES

    Publication Year: 2001, Page(s):229 - 234
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (499 KB)

    In October 2000, after three years of competition between 15 candidate algorithms, the National Standards and Technology (NIST) chose the Rijndael algorithm to be adopted as Advanced Encryption Standard (AES) by the U.S. Department of Commerce, replacing to Data Encryption Algorithm (DES), which has been the standard since 1977. The authors analyze the structure and design of new AES, following th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Home security system and CATV

    Publication Year: 2001, Page(s):293 - 306
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (903 KB)

    The areas of television, telecommunication, and information technology are converging, new application areas are being arising and new services are being and other multimedia services. established. Aside from the traditional delivery channels, computer networks play an increasing role in providing the new services. An important part of these services is based on video. However, in order to develop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handwritten signatures recognizer by its envelope and strokes layout using HMM's

    Publication Year: 2001, Page(s):267 - 271
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (358 KB)

    A method for the automatic recognition of offline handwritten signatures using both global and local features is described. As global features, we use the envelope of the signature sequenced as polar coordinates; and as local features we use points located inside the envelope that describe the density or distribution of signature strokes. Each feature is processed as a sequence by a hidden Markov ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-resolutional face verification system via filter-based integration

    Publication Year: 2001, Page(s):278 - 281
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (323 KB)

    The authors build up a face verification system via multi-resolutional features to identify individuals. In such a system, three fold requirements, including personalization, integration, and adaptive thresholding, should be considered in order to to achieve more accuracy. In order to satisfy the above requirements, R personal feature spaces, an optimal positive Boolean function, and an automatica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-dimensional cluster analysis of class characteristics for ballistics specimen identification

    Publication Year: 2001, Page(s):115 - 121
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (387 KB)

    The characteristic markings on the cartridge and projectile of a bullet fired from a gun can be recognised as a "fingerprint" for identification of the firearm. Over thirty different features within these markings can be distinguished, which in combination produce a "fingerprint" for identification of a firearm. The analysis of marks on cartridge casings and projectiles that have been fired, provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple view dual-energy X-ray imaging

    Publication Year: 2001, Page(s):103 - 107
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (407 KB)

    This paper introduces a multiple view X-ray line-scan imaging technique for the screening of carry-on-luggage and hold cargo encountered in aviation security. The three-dimensional information inherent in the resultant perspective images can be visualised as a smooth object rotation on a video display monitor. It has also been demonstrated that this rotational effect can be incorporated into a dyn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Printers are dangerous

    Publication Year: 2001, Page(s):190 - 196
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (327 KB)

    In the last years, many new intelligent full-featured peripherals that assist information systems have appeared. Those peripherals, such as printers, copiers, PDA organizers, Web cameras, etc. usually have a very friendly way of configuration and management (via http, ftp or telnet servers) and offer more networked services everyday. Their computation, memory and networking capabilities have also ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recent development of fiber optic sensors for perimeter security

    Publication Year: 2001, Page(s):142 - 148
    Cited by:  Papers (2)  |  Patents (19)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (551 KB)

    Outdoors fiber optic disturbance sensors are, now used for perimeter security and were presented at Carnahan Conference in London in 1995 by I.R. Hawkes and Griffiths. The fibre optic interferometer sensor in a Sagnac loop configuration has also been known as a product of Mason and Manson Company since 1994. This paper describes the investigation results of the new generation of the fiber optic pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fingerprint verification using smart cards for access control systems

    Publication Year: 2001, Page(s):250 - 253
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (245 KB)

    During the last years, the authors have been trying to integrate biometrics inside a smart card. In order to improve the error rates obtained with hand geometry biometrics, and the cost involved with iris recognition systems, fingerprints will be used. This technique, quite well known in the industry and deeply studied in the last century, have improved its electronic sensors, pulling down the pri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to security engineering

    Publication Year: 2001, Page(s):34 - 41
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (679 KB)

    Security engineering is often brushed over during the planning phase for many government and industrial installations, even though there may be a very real threat. When considered, the usual solution has been to develop a security measure that addresses the threat as defined by the last successful attack and not the whole threat capability. A selection of case histories, military and civilian, sug... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of automatic number plate recognition reading in managing access to the boots company headquarter site

    Publication Year: 2001, Page(s):52 - 53
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (167 KB)

    The paper presents the rationale for The Boots Company's decision to reduce the level of manned guarding at the access points to it's headquarter site and introduce automatic number plate recognition (ANPR) technology as it's primary means of control of entry View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test and evaluation for determining screener training effectiveness

    Publication Year: 2001, Page(s):96 - 99
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (278 KB)

    For many years, the only FAA-approved checkpoint screener-training program was a classroom lecture developed by the Air Transport Association. In April 1997, the FAA also approved the use of a Computer-Based Training (CBT) program for initial screener training prior to on-the-job training. This study describes a comprehensive test and evaluation of four training programs currently in use at US air... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FRIARS: a feedback control system for information assurance using a Markov decision process

    Publication Year: 2001, Page(s):223 - 228
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (484 KB)

    The authors describe a prototype cyber-defense decision system for autonomously reacting to system attacks by using a Markov Decision Process (MDP), a simple game, and a weighted random culling from select actuators. The system is novel in that the amount of knowledge engineering to build the system is minimal, consisting of knowing the approximate false alarm rate of each of the sensors, the prob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outdoor passive millimetre wave security screening

    Publication Year: 2001, Page(s):172 - 179
    Cited by:  Papers (6)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (627 KB)

    In short range applications such as the outdoor screening of people for security purposes, passive millimetre wave imaging has several benefits: it is not necessary to artificially irradiate subjects, clothing is transparent, and images have similarities to those obtained visibly. The paper outlines the application of these concepts to security screening. A Ka band mechanically scanned imaging sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.