38th Annual 2004 International Carnahan Conference on Security Technology, 2004.最新文献

筛选
英文 中文
N bit-wise modular multiplier architecture for public key cryptography 用于公钥加密的N位模块化乘法器架构
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-12-01 DOI: 10.1109/CCST.2004.1405396
T. Hisakado, N. Kobayashi, T. Ikenaga, T. Baba, S. Goto, K. Higashi, I. Kitao, Y. Tsunoo
{"title":"N bit-wise modular multiplier architecture for public key cryptography","authors":"T. Hisakado, N. Kobayashi, T. Ikenaga, T. Baba, S. Goto, K. Higashi, I. Kitao, Y. Tsunoo","doi":"10.1109/CCST.2004.1405396","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405396","url":null,"abstract":"Along with the progress of the information society, we are relying more and more on digital information processing with security. Cryptography plays an important role in a situation where unwanted eavesdropping or falsification has to be avoided. Public key encryptions including RSA require a huge number of arithmetic operations. Major part of its operation is modular multiplication with very large bit-width. This operation takes long time, and there is an advantage in hardware implementation of it. We propose the hardware implementation of N-bit-wise multiplier. It allows the operation performed at the speed 2 times the original performance for the same circuit size, or the circuit size reduced to approximately 60% for the same processing time. Employing the architecture proposed in this paper contributes to the performance improvement of encryption system and the reduction of chip size of encryption system.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125819733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and telecommunications 保安及电讯
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405369
A. Bilbao
{"title":"Security and telecommunications","authors":"A. Bilbao","doi":"10.1109/CCST.2004.1405369","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405369","url":null,"abstract":"The paper describes the current situation for the use of telecommunications in one Security Services Company in Europe, current evolutionary trends and a vision of the immediate future. The descriptions include telecommunications necessities between: (1) sensors and peripheral devices and central panels in security system installations; (2) security systems panels and alarm monitor stations; (3) guards and their surveillance monitor stations; (4) guards and the security systems attended by them; and (5) guards to guards. The paper tries to support a general view of the need for Security Companies to invest in telecommunications in order to improve the performance of services.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125419583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart sensor integration into security networks 智能传感器集成到安全网络
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405373
L. Cano
{"title":"Smart sensor integration into security networks","authors":"L. Cano","doi":"10.1109/CCST.2004.1405373","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405373","url":null,"abstract":"Sandia has been investigating the use of \"intelligent sensors\" and their integration into \"smart networks\" for security applications. Intelligent sensors include devices that assess various phenomenologies such as radiation, chem-bio agents, radars, and video/video-motion detection. The main problem experienced with these intelligent sensors is in integrating the output from these various sensors into a system that reports the data to users in a manner that enables an efficient response to potential threats. The overall systems engineering is a critical part of bringing these intelligent sensors on-line and is important to ensuring that these systems are successfully deployed. The systems engineering effort includes designing and deploying computer networks, interfaces to make systems interoperable, and training users to ensure that these intelligent sensors can be deployed properly. This paper focuses on Sandia's efforts to investigate the systems architecture for \"smart\" networks and the various interfaces required between \"smart\" sensors to implement these \"smart networks\".","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116381233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric system based in the feature of hand palm 基于手掌特征的生物识别系统
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405381
M. Rafael Diaz, C. Travieso, J. B. Alonso, M. Ferrer
{"title":"Biometric system based in the feature of hand palm","authors":"M. Rafael Diaz, C. Travieso, J. B. Alonso, M. Ferrer","doi":"10.1109/CCST.2004.1405381","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405381","url":null,"abstract":"In this paper, we are going to use the drawings that form the characteristics of the hand palm, as are fold (commonly called lines of the hand), cracks, scars, and even fold of the fingers to verify and identify the persons. We propose a biometric system based on the hand palm image. On this way, a database of 500 hands belonging to 50 users has been built (10 hands by user). It has been studied two different methods for obtaining the parameters of the hand, by measures of textures and by measures of phalanges. The classifier system is a neural network, with back-propagation training algorithm on the Multilayer Perceptron. The found results are over 99% in verification system, and over 98% in identification system.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132228939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Parameterization of a forgery handwritten signature verification system using SVM 基于支持向量机的伪造手写签名验证系统参数化
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405391
L.E. Martinez, C. Travieso, J. B. Alonso, M. Ferrer
{"title":"Parameterization of a forgery handwritten signature verification system using SVM","authors":"L.E. Martinez, C. Travieso, J. B. Alonso, M. Ferrer","doi":"10.1109/CCST.2004.1405391","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405391","url":null,"abstract":"A new method for off-line handwritten signature verification is described in this paper. It is compared with four different parameterization techniques using support vector machines (SVM) as a classification system. The results show which one is the most suitable parameterization technique for this system.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127106316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
A human classification system for a video-acoustic detection platform 一种用于视声检测平台的人体分类系统
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405383
A. Izquierdo-Fuente, J. Villacorta-Calvo, M. Raboso-Mateos, A. Martines-Arribas, D. Rodriguez-Merino, L. del Val-Puente
{"title":"A human classification system for a video-acoustic detection platform","authors":"A. Izquierdo-Fuente, J. Villacorta-Calvo, M. Raboso-Mateos, A. Martines-Arribas, D. Rodriguez-Merino, L. del Val-Puente","doi":"10.1109/CCST.2004.1405383","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405383","url":null,"abstract":"In this paper we present a complete classification system that uses information obtained from several media devices. The definition of tasks and events managed by the core module allows that the system can be adapted, changing the how the system works or adding new modules. The use of a classification module allows the human supervision contributing with greater reliability.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129943253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Facial identification using transformed domain by SVM 基于SVM变换域的人脸识别
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405412
C. Travieso, J. B. Alonso, M. Ferrer
{"title":"Facial identification using transformed domain by SVM","authors":"C. Travieso, J. B. Alonso, M. Ferrer","doi":"10.1109/CCST.2004.1405412","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405412","url":null,"abstract":"In this paper, we propose a facial biometric identification system, using transformed domains such as discrete cosine transforms (DCT), fast Fourier transforms (FFT) and discrete wavelets transforms (DWT). As novel classifier system has been utilized a support vector machines (SVM) (Burges, 1998), and in addition, the way of computing transformed coefficients. With the above system, it has been obtained a simple and robust system with good results, upper to 98% with the ORL face database (400 images) from Olivetti Research Laboratory.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123370384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Intruder detection systems for water-hatches at reservoir sites 水库水口的入侵者探测系统
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405384
R. Chowdhury, S. Tarr
{"title":"Intruder detection systems for water-hatches at reservoir sites","authors":"R. Chowdhury, S. Tarr","doi":"10.1109/CCST.2004.1405384","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405384","url":null,"abstract":"Security-hatch covers provide secure access for staff to underground assets that require protection. In the context of the water-industry, these hatches are used as an access point to reservoirs containing freshly treated drinking water. Access to reservoirs is required for valve repair and routine maintenance such as reservoir cleaning. The use of intruder detection systems is important, as there is a threat of contamination by toxic substances to freshly treated drinking water and of extortion by the threat of contamination. The Police Scientific Development Branch (PSDB) has evaluated security-hatch intruder detection systems for use by the water industry. The effectiveness of two detection systems was assessed when mounted inside a security-hatch and the hatch itself subjected to physical attack. A range of attack styles were 'weighted' based on their perceived likelihood, and an overall probability of detection was calculated for each system. This paper describes the technology behind intruder detection systems for protecting often remote, unattended water-hatches. It describes the capability of such systems for the protection of these hatches such as the false alarm performance, probability of detection and deployment methods.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127782190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Combating transnational crime: management education at the International Law Enforcement Academy (ILEA) 打击跨国犯罪:国际执法学院的管理教育
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405379
R. A. Kromer, F. R. Taylor
{"title":"Combating transnational crime: management education at the International Law Enforcement Academy (ILEA)","authors":"R. A. Kromer, F. R. Taylor","doi":"10.1109/CCST.2004.1405379","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405379","url":null,"abstract":"This paper provides a detailed description of the overall concept, curriculum, and logistical support of the International Law Enforcement Academy at Roswell, New Mexico operated on behalf of the US Department of State's Bureau for International Narcotics and Law Enforcement Affairs. The Department of State is responsible for the operation of a network of law enforcement academies which are designed to increase the capability of the foreign students to combat crime. The Academy at Roswell sponsors the Advanced Management Course, which is designed to increase the managerial capabilities of the mid-level law enforcement managers from foreign states to combat crime, institute democratic practices, and facilitate cooperation with US international law enforcement agencies in order to successfully counter transnational criminal elements. This paper is divided into four parts. Part One describes the history of the Department of State's program and its component parts. Part Two describes the learning objectives of the curriculum and provides an overview of its major elements, including the approach used to teach. Part Three provides an orientation on a typical day for the student, and Part Four explains course attendance and selection requirements.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126215439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security architecture for heterogeneous distributed computing systems 异构分布式计算系统的安全体系结构
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405366
S. Naqvi, M. Riguidel
{"title":"Security architecture for heterogeneous distributed computing systems","authors":"S. Naqvi, M. Riguidel","doi":"10.1109/CCST.2004.1405366","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405366","url":null,"abstract":"Distributed systems face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. The advent of reliable spontaneous networking technologies has ostensibly raised the stakes for the design of computing intensive environments using intelligent devices. As environmental intelligence grows, so will the number of heterogeneous devices connected to the environment. The creation of security and trust paradigms for such technology rich environments is today's great challenge. If the intelligent devices present in a smart environment act as gateways to some huge distributed computing system, then it is indispensable to sweep the threats out from these smart environments, so as to protect not only the local environment, but also the entire distributed system. This article proposes a design of consistent but fine-grained levels of trust and security in distributed systems, open to pervasive, mobile, heterogeneous networks featuring ambient intelligence by gradually virtualizing their security functions. These systems interact in various ways, with floating semantic interoperability between applications, interoperability of communications depending on shared links between those systems, and versatile interconnections. Threats and vulnerability vary according to different systems, objects, applications, and communication links. The salient features of this design include: consideration of duration and time factors in cryptographic protocols by introducing a trusted clock in the network; space for the security of distributed environments by context awareness in the system; mobility (security of mobile code, mobile agents and speed of movement); virtualization of security services.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129379273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信