Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

European Convention on Security and Detection, 1995.

16-18 May 1995

Filter Results

Displaying Results 1 - 25 of 62
  • Using threats to demonstrate the elements of information security

    Publication Year: 1995, Page(s):11 - 17
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (652 KB)

    The purpose of information security that most infosec specialists identify is to preserve the three elements of confidentiality, integrity, and availability of information. The paper by D. Parker (1991) argues that this is a dangerously oversimplified definition of infosec. The preservation of these three elements does not include many kinds of information losses that infosec should prevent. The a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eurotunnel security design to reality

    Publication Year: 1995, Page(s):6 - 10
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (488 KB)

    A discussion is given on security systems for the Eurotunnel project (between the UK and France). The following areas were tackled in the project: staff selection and training, video security system, access control system, government issues, and security equipment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Corporate risk analysis and management strategies

    Publication Year: 1995, Page(s):120 - 127
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (696 KB)

    Whilst many organisations consider they assess security risks in some way, and fair numbers conduct detailed risk analysis and management reviews, very few so far have stood back and questioned “are we spending time and money on the right systems?” and/or “are we focusing on the systems of high risk and providing low risk systems with a level of attention appropriate to low risk ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The implementation of intelligent integrated security and communications systems for the Kuala Lumpur city centre development

    Publication Year: 1995, Page(s):1 - 5
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (492 KB)

    Kuala Lumpur city centre (KLCC) is a mixed-use commercial megaproject that is presently under construction in Malaysia. The total development will be comprised of approximately 2.O mm2 of premium quality, retail, hotel, conference, entertainment, residential, parking and service space constructed on a 40 ha site in the central business district of Kuala Lumpur. The paper discusses the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • List of Authors

    Publication Year: 1995
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (56 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The insurance industry's use of databases to prevent and detect fraud, and improve recoveries

    Publication Year: 1995, Page(s):216 - 224
    Cited by:  Patents (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (944 KB)

    The methods by which insurance fraud are perpetrated include: over insurance; multiple insurance; suppression of information; conversion of uninsured to insured; faking of loss; deliberate loss by policyholder or agent; loss exaggeration. These and other types of fraud can be tackled with the use of centralised databases such as CUE (Common Underwriting Exchange) set up by the ABI. The use of data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Direct non-destructive detection and identification of contraband using Raman microscopy

    Publication Year: 1995, Page(s):138 - 141
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (544 KB)

    This paper is designed to bring to the notice of a wider audience the technique of Raman microscopy as a means for the accurate detection and identification of explosive materials in a non destructive fashion. The direction of the proposed programme of work is also described View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Theft of electricity-how UK electricity companies detect and deter

    Publication Year: 1995, Page(s):90 - 95
    Cited by:  Papers (11)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (584 KB)

    This paper looks at revenue protection activities within the UK to combat the problem of theft of electricity, which is estimated to cost the electricity industry (EI) some £50 m per annum. The nature and scale of the problem is first analyzed, with comments on the relative incidence of the various types of theft and interference, and the legal framework is indicated. A report is then made o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Screening of bottles

    Publication Year: 1995, Page(s):115 - 119
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (396 KB)

    The use of liquid explosives or incendiaries concealed within common beverage bottles such as wines or spirits represents a threat to aviation security. Although liquid explosives and incendiaries may differ in colour and viscosity from alcoholic or non-alcoholic beverage they are nonetheless difficult to distinguish when concealed within coloured bottles. A reliable method of screening bottles is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advances in digital recognition technologies

    Publication Year: 1995, Page(s):77 - 80
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (348 KB)

    The automatic analysis of images for security systems depends on two key system aspects. Firstly, sensing technology and secondly, the processing technology that follows it. This paper is an introduction to some of the advances in recognition systems processing which have recently led to more sophisticated, reliable and powerful systems being deployed in operational use. Examples of such systems i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keeping card data secure at low cost

    Publication Year: 1995, Page(s):212 - 215
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (404 KB)

    The plastic card is indispensable in the daily life of most people, and its use is growing fast. Already widespread in banking, retail, prepaid telephone, ticketing and access control, the use of a card is expanding to take in other applications such as identity and the electronic purse. As the importance of the card and the transaction that it enables grows, so too does the need for security. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced technologies for perimeter intrusion detection sensors

    Publication Year: 1995, Page(s):133 - 137
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (528 KB)

    Perimeter intrusion detection systems are an integral part of most physical security systems. Sandia National Laboratories, under the sponsorship of the US Department of Energy, Office of Safeguards and Security; the US Military Services; and many other US Government Agencies, has over the last 20 years conducted surveys of available perimeter intrusion detection sensors and has tested many of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fingerprint pre-processing on a hexagonal grid

    Publication Year: 1995, Page(s):257 - 260
    Cited by:  Papers (3)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (500 KB)

    A procedure for fingerprint preprocessing on a hexagonal grid is presented. The procedure consists of four stages: filtering to smooth the fingerprint ridges; adaptive segmentation to separate the foreground from the background ridges; noise removal eliminating pores and spurs; and thinning that reduces the ridges to a width of one pixel. Each stage of the procedure is explained in detail along wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • G3 facsimile security option-UK proposal for ITU-TS recommendation

    Publication Year: 1995, Page(s):146 - 150
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (396 KB)

    The presented facsimile security proposal, made from the British Facsimile Industry Consultative Committee, addresses both the security aspect of the transmission and the parallel requirements for message integrity and authentication. The proposal uses two cypher algorithms: HFX40, which is used for the secure transfer of the main facsimile message, and HKM, which is used for secure key management... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • “Shoe-fit”-a computerised shoe print database

    Publication Year: 1995, Page(s):86 - 89
    Cited by:  Papers (7)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (508 KB)

    Shoe prints found at the scene of a crime can provide valuable evidence and intelligence. The wealth of information provided is perplexing unless a methodical system of recognition, investigation and identification is adopted. To assist in this process, a pattern coding system has been devised for use in conjunction with a computerised database providing storage, search and graphic display facilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A shoeprint image coding and retrieval system

    Publication Year: 1995, Page(s):267 - 271
    Cited by:  Papers (4)  |  Patents (8)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (484 KB)

    Footwear marks frequently provide good evidence in certain types of crime. This is particularly true now that sports shoes of all kinds are in popular use. Such footwear is characterised by a huge variety of designs which are often complex in appearance. Microcomputers are now sufficiently powerful to handle large quantities of data including detailed images. This has been accompanied by the avail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural modularisation for robust signature verification

    Publication Year: 1995, Page(s):279 - 283
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (332 KB)

    The authors describe a system for the identification of writers from images of their handwriting, and describe the components of their system, in particular the global and local feature extraction tools. Preliminary results are presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nitrogen-14 quadrupole resonance detection of RDX and HMX based explosives

    Publication Year: 1995, Page(s):288 - 292
    Cited by:  Papers (13)  |  Patents (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (368 KB)

    Concerns the use of 14N signals in RDX and HMX. The principle is to subject the quadrupole nuclei to bursts of RF radiation and monitor the signals generated in the quiescent periods between pulses. These signals may be divided into two types: free induction decays (FID) and echoes. The first is the decaying signal observed immediately following the pulse; it is generated by the interac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environmentally caused variation in exterior intrusion detection

    Publication Year: 1995, Page(s):167 - 171
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (404 KB)

    Environmentally-dependent detection capability is an inescapable aspect of the overall reliability of exterior intrusion detection systems (IDSs). For this reason, security managers need to be aware of the specific site conditions that affect their IDSs. Proximity-to-alarm monitoring provides a direct indication of the interaction between an IDS and its operating environment. In addition to tempor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security for distributed applications

    Publication Year: 1995, Page(s):156 - 160
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (408 KB)

    The advent of low-cost computing platforms has led to a re-evaluation of the way in which computing services are delivered to end users. The centralised computer with all its carefully managed security controls no longer reigns supreme. Instead, applications and their data are increasingly distributed across a multiplicity of platforms involving a mixture of vendors and operating systems. This has... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continuous authentication by analysis of keyboard typing characteristics

    Publication Year: 1995, Page(s):111 - 114
    Cited by:  Papers (14)  |  Patents (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (324 KB)

    This paper describes a simple, software based keyboard monitoring system for the IBM PC for the continuous analysis of the typing characteristics of the user for the purpose of continuous authentication. By exploiting the electrical characteristics of the PC keyboard interface together with modifications to the internal system timer, very accurate measurements can be made of keystroke interval and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Covert and visible lighting for surveillance imaging

    Publication Year: 1995, Page(s):70 - 76
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (612 KB)

    Surveillance video systems have been around for several years now, and much attention has been given to the different system components, however the subject of the best way to light a scene has been dodged by the standardised approach of fitting luminaires at the camera position. Lighting engineers have for many years developed luminaires fit for the purpose of providing light in the right directi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • European standards, the expectations of the industry and the users

    Publication Year: 1995, Page(s):28 - 33
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (344 KB)

    The paper gives an overview of the situation in Europe concerning security standardization, testing and certification and the expectations of the industry and the users. The main problem which is identified is to match the production time of the standards with the innovation speed. Today technology changes so fast that the danger exists that product standards become obsolete when they come out, ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speaker verification based on the orthogonalisation technique

    Publication Year: 1995, Page(s):101 - 105
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (424 KB)

    This paper describes an investigation into text-dependent speaker verification using orthogonal feature parameters of speech. The study is based on the use of a subset of the BT Millar speech database, consisting of repetitions of digit utterances 1 to 9 and zero spoken by 20 male speakers. Sets of orthogonal parameters are obtained through a linear transformation of linear prediction, parcor, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solid image models derived from security X-ray equipment

    Publication Year: 1995, Page(s):306 - 309
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (380 KB)

    A technique has been developed for deriving solid image models from line-scan X-ray equipment which is itself capable of providing three-dimensional images. Descriptions of both the 3-D X-ray equipment and the solid image modelling technique are presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.