Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

1993 Proceedings of IEEE International Carnahan Conference on Security Technology

13-15 Oct. 1993

Filter Results

Displaying Results 1 - 25 of 49
  • Proceedings of IEEE International Carnahan Conference on Security Technology

    Publication Year: 1993
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • The emerging problem of technology and fraud prevention in the 1990's

    Publication Year: 1993, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    The development of a new security technique implemented on visa travel documents issued by the Canadian government is described. The concept was designed and developed for the Canadian government by combining emerging technologies and security printing techniques, creating a two-industry product called Enigma, the Machine Readable Security device (MRS) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The potential of intelligent vehicle highway systems for enhanced traveler security

    Publication Year: 1993, Page(s):117 - 119
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    The author addresses some of the possible security functions that could be applied to transit systems by utilizing the availability of automatic vehicle location systems, broadband digital communication systems, and other IVHS (intelligent vehicle highway systems) functions. Emphasis is placed on the opportunities for security enhancements under the IVHS component for transit, called Advanced Publ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sequelagramy approach to the signature identification mixed with Chinese and English

    Publication Year: 1993, Page(s):5 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The sequelagramy tracing method was applied to 344 signatures of English-speaking Chinese, especially those in southeast Asia. It is shown that, by looking at the sequence and/or form of letters/characters of signatures, one can obtain a positive conclusive identification of signatures without a large sample volume View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of video presentations on knowledge and public attitudes toward radioactive waste storage

    Publication Year: 1993, Page(s):120 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    A study was conducted to determine whether short video presentations of facts about radiation and WIPP (Waste Isolation Pilot Plant) and WIPP transportation would increase knowledge and change attitudes regarding the storage of radioactive waste; and (2) to determine the effect of various audio and visual techniques employed in the video presentations on knowledge acquisition and opinion. Changes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forgery and tamper-proof identification document

    Publication Year: 1993, Page(s):11 - 14
    Cited by:  Patents (44)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    A novel technique for protecting identification documents (ID) against forgery and tampering is described. A security seal is printed beside the photograph on the face of the ID card. The security seal has the dimensions of a postage stamp and contains encrypted information derived from the photograph as well as alphanumeric information normally found on an ID card. It is used to verify the legiti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical design for secure broadcasting using PKD concept

    Publication Year: 1993, Page(s):22 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Based on the concept of public key distribution (PKD), a new practical design for a secure broadcasting system is proposed. The proposed secure broadcast cryptosystem is based on the Diffie-Hellman public key distribution concept. The communication key is hidden with the RSA scheme. The security of the cryptosystem is therefore the same as that of the RSA scheme. The single key concept is used to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a remotely operated intrusion detection system for security applications

    Publication Year: 1993, Page(s):145 - 153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    The author discussed a group of recent system level advancements in electronic security systems technology in the areas of sensor signal processing, remote site command, control and communications, and long-life battery operation. The technology for the advancements presented here have been designed, constructed, tested, and incorporated into operational security systems. Actual system architectur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acoustic aircraft detection sensor

    Publication Year: 1993, Page(s):127 - 133
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    A great deal of illicit cargo enters the United States on small, fixed wing, propeller-driven aircraft. Acoustic sensors are capable of detecting, recognizing, and locating low flying fixed wing aircraft even when the aircraft are not within line of sight. The authors present the technology principles for the design of an acoustic aircraft detection sensor, including prediction of detection range,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast response CCTV image recall and motion detection

    Publication Year: 1993, Page(s):44 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    An Advanced Alarm Assessment System has resulted from the merging of two CCTV (closed-circuit television) related technologies: (1) a Presearch Image Capture System (PICS) which captures and displays images from before and after an intrusion alarm; and (b) an IMAGO series video sentry and target tracker which detects motion and, optionally, controls camera pan/tilt. The new technology MPICS (Motio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concrete at high temperatures above 1000°C

    Publication Year: 1993, Page(s):263 - 268
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    Ordinary concrete samples made from the most common Portland Type I cement as well as some uncommon glossy-looking concrete lumps collected from an actual fire scene have been examined using thermal gravity analysis (TGA), differential thermal analysis (DTA), X-ray diffraction, and scanning electron microscope/energy dispersive X-ray spectrometry (SEM/EDX) with the aid of an unsealed furnace. Chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Considerations in outdoor intrusion sensor testing

    Publication Year: 1993, Page(s):66 - 71
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The author reviews the role of a test site for outdoor intrusion sensor testing in a commercial environment and describes its application to sensor research, development, product verification, and training. Elements of a test site are reviewed along with its varied uses in the bringing of new sensors to market and performing comparative analyses of existing technologies. Particular references and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two complementary approaches to the full identification of automobile paints

    Publication Year: 1993, Page(s):96 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    Pyrolysis/gas chromatography (Py-GC) and scanning electron microscope/energy dispersive X-ray spectrometry (SEM/EDX) are two commonly used methods for the identification of automobile paints. Some modifications were made on the conventional Py-GC to improve its discriminating power. Twelve exemplar samples of similar white remedy paint chip were unambiguously differentiated using this method. To f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on employing traditional Chinese medical knowledge in polygraphy technology

    Publication Year: 1993, Page(s):15 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    A study has been carried out on the use of a polygraph to analyze the psychological reaction intensity difference between the acupoints and the other parts of the human body. The results of employing traditional Chinese medical knowledge in polygraphic technology are presented. The feasibility of the application of acupuncture to lie detection is examined View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CCTV systems; adding value with new technology

    Publication Year: 1993, Page(s):38 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The author examines the impact which new technologies and techniques will have upon both existing and future closed-circuit television (CCTV) systems. He considers devices ranging from video entry phones to advanced surveillance cameras and proposes ways in which value can be added by extending the range of functions which the devices can perform. Examples are presented which show how the value of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk-based approach to design and maintenance of alarm systems for security

    Publication Year: 1993, Page(s):254 - 258
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    Risk-based approaches to the design and maintenance of an alarm system for security are presented. Based on the values of its sensors, the security alarm system identifies all enemies entering the system. In the design problem, a simple systematic method is given to obtain the minimal combination of sensors that can identify all enemies with the minimal error risk. In the maintenance problem, a si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attacks on ID-based signature scheme based upon Rabin's public key cryptosystem

    Publication Year: 1993, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    Two attacks are given to show that the identity-based signature scheme proposed by C. C. Chang and C. H. Lin (1991) based upon Rabin's public key cryptosystem is not secure enough. One of the attacks is based on the conspiracy of two users in the system while the other can be performed by anyone alone. It is shown that, in this second attack, the scheme can be broken by anyone (not necessarily a u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrity and security in AM/FM-GIS

    Publication Year: 1993, Page(s):203 - 207
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    The authors present the integrity and security requirements of AM/FM-GIS (geographic information system) systems, involving the security of the operating system, the DBMS (database management systems), and graphic information. Well-established security services and mechanisms developed for EDP on-line systems can be applied to AM/FM-GIS. In AM/FM-GIS, the security issue can be approached with form... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signal processing of gravitational field detector for prediction of large seismic waves

    Publication Year: 1993, Page(s):215 - 218
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    The author describes the basic concept and signal processing of a gravitational field detector for prediction of large seismic waves. When the seismograph and the gravitational field detector are set at the same place, the seismograph does not respond until the arrival of the primary wave, but the gravitational field detector will respond to the gravitational field before the primary wave arrival.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using smart cards to authenticate passwords

    Publication Year: 1993, Page(s):154 - 156
    Cited by:  Papers (2)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    A password authentication scheme which can verify remote passwords without the use of a verification table is presented. Each user possesses a smart card which is used for login and authentication, as introduced by A. Shamir (1985). During the login, the user types in his identity and the password associated with his smart card, along with the identity of the other user with whom he wishes to comm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interference with reception of VLF switching signals transmitted over local powerlines

    Publication Year: 1993, Page(s):224 - 227
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Swiss power companies require controlled load-shedding to limit peak power loads. They can actively shed the load by sending VLF coded signals along local powerlines to "Decabit" receivers which switch the power to boilers and washing machines in homes. Individual switching codes are also used to change kWh meters from a high daytime tariff to a low night tariff from 10 pm to 6 am. Users of such s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic access control model for object-oriented system

    Publication Year: 1993, Page(s):159 - 163
    Cited by:  Papers (1)  |  Patents (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    The authors propose a dynamic access control model (DACM) to meet the access control requirements of an environment that frequently changes and adjusts user access privileges and/or target object confidential level. For the DACM, one uses an object-oriented technique to describe the whole model and also to implement its access control mechanism called the dynamic access control system. A real case... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal allocation of security sensors/guards-graph theoretic approach

    Publication Year: 1993, Page(s):134 - 138
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The problem of optimal allocation of security sensors and/or guards is formulated as a graph/network problem, where the importance of the concept of degree of security or multiple minimal cut set is stressed. An algorithm for solving the formulated graph/network problem is developed and it is shown that the algorithm is very effective from the viewpoint of computational complexity. Examples are gi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic video image moving target detection for wide area surveillance

    Publication Year: 1993, Page(s):47 - 57
    Cited by:  Papers (6)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    Two image processing techniques developed for moving target indication from video infrared imagery in natural scenes are presented. It is shown that frequency domain spatio-temporal filtering of video sequences and spatio-temporal constraint error of image frame pairs are able to detect and track moving targets (e.g., personnel) in natural scenes in spite of low image contrast, changes in the targ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of computer-aided design software with standards for security engineering

    Publication Year: 1993, Page(s):235 - 243
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    The authors give an overview of the development of computer-aided design (CAD) software with standards for security engineering. The intent of the developed software is to increase design productivity and generate CAD standards for security engineering View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.