Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186)

16-19 Oct. 2001

Filter Results

Displaying Results 1 - 25 of 45
  • Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186)

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (219 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s): 17
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • One-time installation with traitors tracing for copyright programs

    Publication Year: 2001, Page(s):149 - 155
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB)

    We propose an innovative software protection scheme by using smart cards. By the use of this scheme, a buyer can purchase software, from a merchant on the Internet, using his (or her) smart card. The bought software, after downloading from website of the merchant, will be protected in such a way that it can only be installed one time in the buyer's computer. Further, a buyer who redistributed copi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • U.S. Department of Energy security technologies

    Publication Year: 2001, Page(s):19 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (506 KB)

    The U.S. Department of Energy (DOE) has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than 40 years. Basic security system engineering concepts are still valid, but the details of the system at DOE facilities must constantly be updated to respond to the escalating terrorist threat and the need to replace aging components and systems. The mission ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer assistance to communication and co-ordination during emergencies

    Publication Year: 2001, Page(s):42 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB)

    The authors have been involved in crisis management for many years, in the armed forces, in industry and as consultants in crisis and media management, and have been part of a. large number of exercises and live incidents. Experience has shown that the elements of response to an incident that are often fatally weak are communication and co-ordination, without which no individual or team can be tru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrepid monostatic microwave radar putting ranging back into radar

    Publication Year: 2001, Page(s):136 - 141
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    The Intrepid Digital Transceiver operates at K-band similar to the digital bistatic microwave. It shares the same antenna that is designed to have a very narrow beam width but with a special vertical pattern to detect the crawling intruder at close range. It uses logarithmic amplifiers to compress the dynamic range of the Doppler responses. The paper describes the system concept, the hardware, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elliptic curve cryptosystems on smart cards

    Publication Year: 2001, Page(s):213 - 222
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB)

    The use of public-key cryptosystems (PKC) received considerable attention. They are beneficial in encryption as well as signing which play an essential role in electronic banking and financial transactions. Elliptic Curve Cryptography (ECC) is one of best public key techniques because of its small key size and high security. Secure applications in smart cards present implementation challenges part... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of protocol for e-voting on the Internet

    Publication Year: 2001, Page(s):180 - 189
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    The paper proposes a practical anonymous secure electronic voting protocol in which the communications are based on the Internet. This protocol employs blind signature to ensure that only eligible registered voters can participate in the election activity, and each eligible registered voter can securely vote at most once. This protocol, with secret sharing methods, prevents any facility from falsi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of an explosive detection device based on quadrupole resonance (QR) technology in aviation security

    Publication Year: 2001, Page(s):282 - 288
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB)

    The Federal Aviation Administration has deployed Advanced Technology (AT) based explosive detection devices for screening checked baggage in US domestic airports. The paper addresses the application of quadrupole resonance (QR) technology to detect explosives in checked baggage in aviation security. This technology was deployed in combination with advanced X-ray by the US government. The paper foc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fingerprint verification using smart cards for access control systems

    Publication Year: 2001, Page(s):250 - 253
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB)

    During the last years, the authors have been trying to integrate biometrics inside a smart card. In order to improve the error rates obtained with hand geometry biometrics, and the cost involved with iris recognition systems, fingerprints will be used. This technique, quite well known in the industry and deeply studied in the last century, have improved its electronic sensors, pulling down the pri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-dimensional cluster analysis of class characteristics for ballistics specimen identification

    Publication Year: 2001, Page(s):115 - 121
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB)

    The characteristic markings on the cartridge and projectile of a bullet fired from a gun can be recognised as a "fingerprint" for identification of the firearm. Over thirty different features within these markings can be distinguished, which in combination produce a "fingerprint" for identification of a firearm. The analysis of marks on cartridge casings and projectiles that have been fired, provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to security engineering

    Publication Year: 2001, Page(s):34 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (679 KB)

    Security engineering is often brushed over during the planning phase for many government and industrial installations, even though there may be a very real threat. When considered, the usual solution has been to develop a security measure that addresses the threat as defined by the last successful attack and not the whole threat capability. A selection of case histories, military and civilian, sug... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of automatic number plate recognition reading in managing access to the boots company headquarter site

    Publication Year: 2001, Page(s):52 - 53
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB)

    The paper presents the rationale for The Boots Company's decision to reduce the level of manned guarding at the access points to it's headquarter site and introduce automatic number plate recognition (ANPR) technology as it's primary means of control of entry View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minutiae detection algorithm for fingerprint recognition

    Publication Year: 2001, Page(s):264 - 266
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB)

    Amongst the main innovation prospects within the so called information society, and in the framework of future communications systems, we find the design of database-access integral services, e-commerce and communication systems, together with remote control of terminals and devices, are all the result of global services derived from last generation integration of mobile telephony and Internet. So... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IntelliFIBERTM - the next generation fiber optic fence sensor

    Publication Year: 2001, Page(s):128 - 135
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (833 KB)

    Outdoor perimeter fence detection sensors must reliably detect intruders attempting to cut or climb a barrier fence, while rejecting environmental noise including nearby human activity. Many different detection principles have been employed over the years to provide a signature of an intruder, as well as algorithms to differentiate the characteristics of an intruder from those of a changing enviro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rapid data collection at major incident scenes using three dimensional laser scanning techniques

    Publication Year: 2001, Page(s):60 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (639 KB)

    The development of commercial laser scanning hardware/software systems, which are specifically designed for the acquisition and analysis of three dimensional (3D) data, now offers innovative tools for the rapid collection, analysis and interpretation of detailed information at complex and hazardous incident scenes. This paper reviews TRL's use of 3D laser scanning systems at major incident scenes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • m-security (security and mobile telephony)

    Publication Year: 2001, Page(s):76 - 84
    Cited by:  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    This paper shows a view of the relationship, now closer than ever, between mobile telephony and security. The paper focuses on this relationship as it stands at the moment with regard to its functional nature and the technology involved, and how the relationship will vary in the very near future, when forthcoming technologies will improve and refine the performance of this communication resource. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authorization in data management systems

    Publication Year: 2001, Page(s):202 - 212
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (818 KB)

    Computer systems for data management are increasingly concerned with the authorization problem: the problem of creating and managing the matrix of users, objects, and allowable operations. The paper discusses the authorization problem and explains why the problem is likely to become more complex in the future. We then present the use of database normalization theory to formalize and address the au... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outdoor passive millimetre wave security screening

    Publication Year: 2001, Page(s):172 - 179
    Cited by:  Papers (6)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB)

    In short range applications such as the outdoor screening of people for security purposes, passive millimetre wave imaging has several benefits: it is not necessary to artificially irradiate subjects, clothing is transparent, and images have similarities to those obtained visibly. The paper outlines the application of these concepts to security screening. A Ka band mechanically scanned imaging sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-resolutional face verification system via filter-based integration

    Publication Year: 2001, Page(s):278 - 281
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB)

    The authors build up a face verification system via multi-resolutional features to identify individuals. In such a system, three fold requirements, including personalization, integration, and adaptive thresholding, should be considered in order to to achieve more accuracy. In order to satisfy the above requirements, R personal feature spaces, an optimal positive Boolean function, and an automatica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using classifiers to predict linear feedback shift registers

    Publication Year: 2001, Page(s):240 - 249
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    Previously (J.C. Hernandez et al., 2000), some new ideas that justify the use of artificial intelligence techniques in cryptanalysis are presented. The main objective of that paper was to show that the theoretical next bit prediction problem can be transformed into a classification problem, and this classification problem could be solved with the aid of some AI algorithms. In particular, they show... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Objective and subjective image quality evaluation for security technology

    Publication Year: 2001, Page(s):108 - 114
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (929 KB)

    The paper is devoted to the impacts of image compression algorithms on security image data. It compares three fundamentally different evaluation techniques of image objective criteria, subjective criteria and identification. We have selected two typical security image data (a car plate and a face) with different initial quality and we applied three different compression techniques-two professional... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The management of threat events

    Publication Year: 2001, Page(s):27 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB)

    Events which threaten life, property, the community or the environment, make particular demands, both financial and human, on those responsible for decision making when controlling and co-ordinating resources in response to those events. Technology is now able to provide us with a computer representation of the real world, rather than having to rely upon real exercises. This allows decision-makers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secured by design - learning from the past to secure the future!

    Publication Year: 2001, Page(s):45 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    The Secured by Design (SBD) scheme is a United Kingdom police crime prevention initiative in which the police inspect building designs and recommend actions to 'prevent crime'. If those recommended actions are implemented, the scheme is awarded the police SBD logo that suggests the buildings are approved by the police as being secure. The scheme has been in operation for over a decade and has tend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recent development of fiber optic sensors for perimeter security

    Publication Year: 2001, Page(s):142 - 148
    Cited by:  Papers (2)  |  Patents (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB)

    Outdoors fiber optic disturbance sensors are, now used for perimeter security and were presented at Carnahan Conference in London in 1995 by I.R. Hawkes and Griffiths. The fibre optic interferometer sensor in a Sagnac loop configuration has also been known as a product of Mason and Manson Company since 1994. This paper describes the investigation results of the new generation of the fiber optic pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.