38th Annual 2004 International Carnahan Conference on Security Technology, 2004.

11-14 Oct. 2004

Filter Results

Displaying Results 1 - 25 of 75
  • Elliptic curve cryptography on constraint environments

    Publication Year: 2004, Page(s):212 - 220
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (797 KB) | HTML iconHTML

    The main target of this work is to expose the capacities that make elliptic curve cryptography the most suitable one to be implemented in environments with several constraints related to processor speed, bandwidth, security and memory. We have analyzed several elliptic curve cryptosystems with other public key ones. We have made a comparison among different public key cryptosystems (such as ElGama... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intruder detection systems for water-hatches at reservoir sites

    Publication Year: 2004, Page(s):153 - 155
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    Security-hatch covers provide secure access for staff to underground assets that require protection. In the context of the water-industry, these hatches are used as an access point to reservoirs containing freshly treated drinking water. Access to reservoirs is required for valve repair and routine maintenance such as reservoir cleaning. The use of intruder detection systems is important, as there... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE 802.11, OpenAir and HomeRF for 2.4 Ghz spread-spectrum wireless data communication within a metal transportation vehicle

    Publication Year: 2004, Page(s):204 - 211
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (755 KB) | HTML iconHTML

    The proliferation of commercial-off-the-shelf (COTS) and low-cost wireless communication technology has expanded into many new applications, many of which are relevant to the international security community. Although most applications of these new wireless technologies are for architectures typical of a business enterprise, the need to wirelessly monitor the transportation of nuclear materials in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A human classification system for a video-acoustic detection platform

    Publication Year: 2004, Page(s):145 - 152
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (718 KB) | HTML iconHTML

    In this paper we present a complete classification system that uses information obtained from several media devices. The definition of tasks and events managed by the core module allows that the system can be adapted, changing the how the system works or adding new modules. The use of a classification module allows the human supervision contributing with greater reliability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combating transnational crime: management education at the International Law Enforcement Academy (ILEA)

    Publication Year: 2004, Page(s):116 - 130
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1089 KB) | HTML iconHTML

    This paper provides a detailed description of the overall concept, curriculum, and logistical support of the International Law Enforcement Academy at Roswell, New Mexico operated on behalf of the US Department of State's Bureau for International Narcotics and Law Enforcement Affairs. The Department of State is responsible for the operation of a network of law enforcement academies which are design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-field technology update

    Publication Year: 2004, Page(s):61 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB) | HTML iconHTML

    Electric field (E-field) sensors were introduced by Stellar Incorporated in 1975 and approved for DOE use by Sandia in 1977. Since then there have been numerous product changes and adaptations to utilize this technology to address a wide range of applications. All such products and product variants rely on the basic concept of measuring changes in capacitance between a "field" wire and a "sense" w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient anonymous scheme for computer and communication privacy

    Publication Year: 2004, Page(s):199 - 203
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB) | HTML iconHTML

    Due to the rising of on-line C&C (computer and communication) applications, users require an anonymous channel to transfer sensitive or confidential data on the networks. How to hide the sources and their locations during communications becomes an important problem. Although previous schemes such as IPSec can provide data protection for private communications, they require special devices (i.e. se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of the elliptic curve cryptology applies to the next generation protocol

    Publication Year: 2004, Page(s):233 - 238
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (521 KB)

    In recent years, Internet and the electronic commerce are very hot. Not only people start to care about the network security level where they use credit cards to order they want but also they have the idea about the network security. At the moment, the algorithm of RSA (Rivest-Shamir-Adleman) is used by the public key cryptology and digital signature. When end users need to send data to another on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anti-trojan security module for biometric authentication tasks

    Publication Year: 2004, Page(s):140 - 144
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    When implementing biometric authentication systems, several problems related to security should be faced. These problems are mostly derived from the high sensibility of biometric data, and the feeling of governmental control when central databases are used. This paper introduces the work being done by the authors, to provide new means for overcoming them. This new solutions are focused on developi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The development of a Security Systems Research and Test Laboratory at a university

    Publication Year: 2004, Page(s):111 - 115
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB) | HTML iconHTML

    This paper describes the development of the Security Systems Research and Test Laboratory at Edith Cowan University (ECU), and outline the approaches the collaborating partners will follow in testing and evaluating the security systems. The paper discusses the benefits that the Laboratory brings to the security industry through the its testing and evaluation function. Also, the benefits of the Lab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security technology decision tree tool

    Publication Year: 2004, Page(s):91 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB) | HTML iconHTML

    The U.S. Army Engineer Research and Development Center has developed a decision tree tool, to help users implement security measures based on intrusion detection and automated video surveillance technology. The security technology decision tree tool (STDTT) is a computer application that leads the user through specification of security objectives, identification of constraints attributable to noni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and telecommunications

    Publication Year: 2004, Page(s):56 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (547 KB)

    The paper describes the current situation for the use of telecommunications in one Security Services Company in Europe, current evolutionary trends and a vision of the immediate future. The descriptions include telecommunications necessities between: (1) sensors and peripheral devices and central panels in security system installations; (2) security systems panels and alarm monitor stations; (3) g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive firewall model to detect email viruses

    Publication Year: 2004, Page(s):197 - 198
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    This paper presents an adaptive approach to preventing the damage caused by viruses that travel via email. The approach protects intranet machines from outside infected machines by spreading email viruses. This directly addresses the two ways that viruses cause damage: less machines spreading the virus will reduce the number of machines infected and reduce the traffic generated by the virus. We pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image compression techniques in the field of security technology: examples and discussion

    Publication Year: 2004, Page(s):278 - 284
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    The image compression techniques are widely applied in the field of security technology (perimeter supervision, CCTV in facilities, faces, fingerprints, car plates etc.). The extensive and dramatically expanding use of image information requires increasing capacity of either transmission channels or retrieving devices. The image compression techniques offer a partial solution of this problem but t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible and lossless data hiding with application in digital library

    Publication Year: 2004, Page(s):226 - 232
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (761 KB) | HTML iconHTML

    Recently, the development of data hiding techniques to hide annotations, confidential data, or side information into multimedia attracts the attention of researchers in various fields, especially in digital library. One of the essential tasks in digital library is the digitization of arts together with the corresponding textural descriptions. The purpose of data hiding is to embed relating textura... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electrified security fences - towards a security standard

    Publication Year: 2004, Page(s):164 - 168
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (629 KB) | HTML iconHTML

    The Police Scientific Development Branch (PSDB) is developing standards to enable the specification of Perimeter Intrusion Detection Systems (PIDS) for particular security levels. The objective is to encourage perimeter security solutions to be developed to an appropriate and consistent quality. Electrified security fencing, the topic of this paper, is one perimeter security solution to be address... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric system based in the feature of hand palm

    Publication Year: 2004, Page(s):136 - 139
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (605 KB) | HTML iconHTML

    In this paper, we are going to use the drawings that form the characteristics of the hand palm, as are fold (commonly called lines of the hand), cracks, scars, and even fold of the fingers to verify and identify the persons. We propose a biometric system based on the hand palm image. On this way, a database of 500 hands belonging to 50 users has been built (10 hands by user). It has been studied t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aviation data networks: security issues and network architecture

    Publication Year: 2004, Page(s):77 - 81
    Cited by:  Papers (10)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    The information technology (IT) revolution, combined with people's need to access information quickly, has resulted in the explosive growth of the Internet in the past decade. Ubiquitous access to the Internet has become an essential component of a mobile workforce and multiple mechanisms are being devised to ensure seamless connectivity to corporate resources. An integrated security framework req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security risk assessment methodology for communities (RAM-C)

    Publication Year: 2004, Page(s):106 - 110
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (599 KB) | HTML iconHTML

    Sandia National Laboratories (SNL) has developed a number of security risk assessment methodologies (RAMs) for various infrastructures including dams, water systems, electrical transmission, chemical facilities and communities. All of these RAMs consider potential malevolent attacks from different threats, possible undesired events and consequences and determine potential adversary success. They f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The real privacy and security implications of the USA Patriot Act

    Publication Year: 2004, Page(s):17 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (750 KB) | HTML iconHTML

    The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA Patriot Act) of 2001 has aroused the concern of privacy advocates as well as others who question its effectiveness in combating terrorism. The Act amended over 15 important statutes and significantly expands the authority of government to conduct investigations and monitor inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing system design requirements information

    Publication Year: 2004, Page(s):85 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (686 KB) | HTML iconHTML

    Sandia National Laboratories (SNL), Security Technology Department provides program support to design security systems and related improvements. During one of these projects, a relational database system was developed to categorize and to help cross match the requirements from several documents. A "design requirements" matrix was created that shows the requirements met by the improved security sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security architecture for heterogeneous distributed computing systems

    Publication Year: 2004, Page(s):34 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (846 KB) | HTML iconHTML

    Distributed systems face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. The advent of reliable spontaneous networking technologies has ostensibly raised the stakes for the design of computing intensive environments using intelligent devices. As environmental intelligence grows, so will the number of heterogeneous devices conne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and testing of a portable vehicle crash barrier

    Publication Year: 2004, Page(s):47 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (679 KB) | HTML iconHTML

    The most widely quoted and generally adopted vehicle barrier specification is the American Dept. of State specification SD-STD-02.01 published in April 1985 which in summary asks for the arrest of a 15000lb vehicle moving at 30, 40, or 50 mph within 3ft, 20ft or 50ft. The testing required to achieve this rating is clearly laid out in the standard documentation (SD-STD-02.01) and revolves around us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parameterization of a forgery handwritten signature verification system using SVM

    Publication Year: 2004, Page(s):193 - 196
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    A new method for off-line handwritten signature verification is described in this paper. It is compared with four different parameterization techniques using support vector machines (SVM) as a classification system. The results show which one is the most suitable parameterization technique for this system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • History Note - 39th Annual 2005 IEEE International Carnahan Conference on Security Technology

    Publication Year: 2004, Page(s):13 - 14
    Request permission for commercial reuse | PDF file iconPDF (452 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.