Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Developments, applications of and experiences with a digital processed microphonic cable sensor 数字处理传声器电缆传感器的发展、应用和经验
L. Den Dooven, G. Hellard
{"title":"Developments, applications of and experiences with a digital processed microphonic cable sensor","authors":"L. Den Dooven, G. Hellard","doi":"10.1109/CCST.1997.626235","DOIUrl":"https://doi.org/10.1109/CCST.1997.626235","url":null,"abstract":"In the late 1970s the first microphonic cable detection systems for fences appeared on the market. In comparison to existing fence sensors built in solid housings already on the market at the time, these systems had many advantages, e.g. they were simple to install, highly reliable with high performance and good value for money. Developments in technology over the years has lead to various microphonic cable developments on the basis of different technological and physical principles. However, the performance of all these systems was restricted by the very simple analog evaluation principles used by different manufactures. Sensitivity was adjustable but not defined, and the detection to false alarm ratio was rather an accidental result of a longer testing period. In 1993 the PERIFON-M(R) system appeared on the market. It was the first microphonic sensor based on digital evaluation principles. Its automatic adjustment to any fence structure represents a significant breakthrough in solving the various problems mentioned above. This paper will describe the processing principle, integration of various fence structures, automatic sensor adjustment, detection, false alarm recognition, the performance and maintenance program, intercommunication using a portable PC and finally the experience with the system over the last three years.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123168921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authenticated tracking and monitoring system (ATMS) tracking shipments from an Australian uranium mine 跟踪澳大利亚铀矿货物的认证跟踪和监测系统(ATMS)
J. L. Schoeneman, D. Sorokowski
{"title":"Authenticated tracking and monitoring system (ATMS) tracking shipments from an Australian uranium mine","authors":"J. L. Schoeneman, D. Sorokowski","doi":"10.1109/CCST.1997.626275","DOIUrl":"https://doi.org/10.1109/CCST.1997.626275","url":null,"abstract":"The Authenticated Tracking and Monitoring System (ATMS) answers the need for global monitoring of the status and location of sensitive items on a worldwide basis, 24 hours a day. The ATMS concept uses wireless sensor packs to monitor the status of the items and environmental conditions, to collect a variety of sensor event data, and to transmit the data through the INMARSAT satellite communication system, which then sends the data to appropriate ground stations for tracking and monitoring. Authentication and encryption algorithms are used throughout the system to secure the data during communication activities. A typical ATMS application would be to track and monitor the safety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements. Following discussions between the Australian Safeguards Office (ASO), the U.S. Department of Energy (DOE), and Sandia National Laboratories (SNL) in early 1995, the parties mutually decided to conduct and evaluate a field trial prototype ATMS to track and monitor shipments of uranium ore concentrate (UOC) from a currently operating uranium mine in Australia to a final destination in Europe. This trial is in the process of being conducted on a worldwide basis with tracking and monitoring stations located at sites in both Australia and the U.S. This paper describes the trial.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131553723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Digital and analogue watermarking of video recordings 视频记录的数字和模拟水印
O. D'Souza
{"title":"Digital and analogue watermarking of video recordings","authors":"O. D'Souza","doi":"10.1109/CCST.1997.626241","DOIUrl":"https://doi.org/10.1109/CCST.1997.626241","url":null,"abstract":"The security industry is increasingly using video as a tool to support the fight against crime. The volume of video recordings and image data that is being stored is growing at an alarming rate and may soon become unmanageable and/or unusable as evidence as a result of the current poor management of this valuable resource. Digital Video and/or Images are now clearly identified as valuable \"DATA\" by security personnel, clients, law enforcement authorities and the legal profession. However, the current authenticity of most of this \"data\" is questionable because there are no formal \"secure tagging\" and handling guidelines and/or standards. As an example, the formal methods in place to issue and secure the issue of keys have established unique tracing systems and databases in the lock and safe industry. Information maintained generally helps to identify origins and establish some uniqueness that improves the management and traceability of something as small as a key.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131925725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The usage of satellite communications at the police of Japan 日本警察使用卫星通讯
A. Takashi
{"title":"The usage of satellite communications at the police of Japan","authors":"A. Takashi","doi":"10.1109/CCST.1997.626272","DOIUrl":"https://doi.org/10.1109/CCST.1997.626272","url":null,"abstract":"National Police Agency of Japan-NPA-has established Satellite Communication System all over Japan and is operating it. This system supplies services such as not only the satellite telephone, but also the video transmission in a high-resolution mode, in addition, the communication of high-speed computer data to all police organizations in Japan. The main reason of building the system is to promote the quality of police service in various fields. We have installed fixed type satellite communication sets, mobile type sets and a portable type set. When some cases happened, we bring them to the spots, and send images, voices and data to NPA and the Prefectural Police Headquarters-PPH. The system enables commanders to manage police activities from remote places because they can grasp the circumstances with the information transmitted. In this paper, I describe some characteristics of this system and explain some examples for the effective usage.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117013043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3-D X-ray image modelling. Latest developments 三维x射线图像建模。最新进展
Jpo Evans, Max Robinson, J. Bentley
{"title":"3-D X-ray image modelling. Latest developments","authors":"Jpo Evans, Max Robinson, J. Bentley","doi":"10.1109/CCST.1997.626267","DOIUrl":"https://doi.org/10.1109/CCST.1997.626267","url":null,"abstract":"This paper presents recent results obtained from a solid image modelling technique utilising line-scan X-ray equipment incorporating materials discrimination capability.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129729320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Management for real key systems. A software solution 管理真正的关键系统。软件解决方案
{"title":"Management for real key systems. A software solution","authors":"","doi":"10.1109/CCST.1997.626253","DOIUrl":"https://doi.org/10.1109/CCST.1997.626253","url":null,"abstract":"It is a common requirement of any organisation that uses locks to secure rooms, that a proper method of recording and controlling the keys is needed. Even automatic swipe card or pin numbers systems still require a manual key override in the case of an emergency. This paper took at the three piers of key management and the requirements to properly and accurately record who has/had what key and what that they gave them access to. An implementation of these requirements is demonstrated in the windows based software package known as KeyMan.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126193831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信