T. Hisakado, N. Kobayashi, T. Ikenaga, T. Baba, S. Goto, K. Higashi, I. Kitao, Y. Tsunoo
{"title":"N bit-wise modular multiplier architecture for public key cryptography","authors":"T. Hisakado, N. Kobayashi, T. Ikenaga, T. Baba, S. Goto, K. Higashi, I. Kitao, Y. Tsunoo","doi":"10.1109/CCST.2004.1405396","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405396","url":null,"abstract":"Along with the progress of the information society, we are relying more and more on digital information processing with security. Cryptography plays an important role in a situation where unwanted eavesdropping or falsification has to be avoided. Public key encryptions including RSA require a huge number of arithmetic operations. Major part of its operation is modular multiplication with very large bit-width. This operation takes long time, and there is an advantage in hardware implementation of it. We propose the hardware implementation of N-bit-wise multiplier. It allows the operation performed at the speed 2 times the original performance for the same circuit size, or the circuit size reduced to approximately 60% for the same processing time. Employing the architecture proposed in this paper contributes to the performance improvement of encryption system and the reduction of chip size of encryption system.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125819733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and telecommunications","authors":"A. Bilbao","doi":"10.1109/CCST.2004.1405369","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405369","url":null,"abstract":"The paper describes the current situation for the use of telecommunications in one Security Services Company in Europe, current evolutionary trends and a vision of the immediate future. The descriptions include telecommunications necessities between: (1) sensors and peripheral devices and central panels in security system installations; (2) security systems panels and alarm monitor stations; (3) guards and their surveillance monitor stations; (4) guards and the security systems attended by them; and (5) guards to guards. The paper tries to support a general view of the need for Security Companies to invest in telecommunications in order to improve the performance of services.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125419583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart sensor integration into security networks","authors":"L. Cano","doi":"10.1109/CCST.2004.1405373","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405373","url":null,"abstract":"Sandia has been investigating the use of \"intelligent sensors\" and their integration into \"smart networks\" for security applications. Intelligent sensors include devices that assess various phenomenologies such as radiation, chem-bio agents, radars, and video/video-motion detection. The main problem experienced with these intelligent sensors is in integrating the output from these various sensors into a system that reports the data to users in a manner that enables an efficient response to potential threats. The overall systems engineering is a critical part of bringing these intelligent sensors on-line and is important to ensuring that these systems are successfully deployed. The systems engineering effort includes designing and deploying computer networks, interfaces to make systems interoperable, and training users to ensure that these intelligent sensors can be deployed properly. This paper focuses on Sandia's efforts to investigate the systems architecture for \"smart\" networks and the various interfaces required between \"smart\" sensors to implement these \"smart networks\".","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116381233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rafael Diaz, C. Travieso, J. B. Alonso, M. Ferrer
{"title":"Biometric system based in the feature of hand palm","authors":"M. Rafael Diaz, C. Travieso, J. B. Alonso, M. Ferrer","doi":"10.1109/CCST.2004.1405381","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405381","url":null,"abstract":"In this paper, we are going to use the drawings that form the characteristics of the hand palm, as are fold (commonly called lines of the hand), cracks, scars, and even fold of the fingers to verify and identify the persons. We propose a biometric system based on the hand palm image. On this way, a database of 500 hands belonging to 50 users has been built (10 hands by user). It has been studied two different methods for obtaining the parameters of the hand, by measures of textures and by measures of phalanges. The classifier system is a neural network, with back-propagation training algorithm on the Multilayer Perceptron. The found results are over 99% in verification system, and over 98% in identification system.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132228939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L.E. Martinez, C. Travieso, J. B. Alonso, M. Ferrer
{"title":"Parameterization of a forgery handwritten signature verification system using SVM","authors":"L.E. Martinez, C. Travieso, J. B. Alonso, M. Ferrer","doi":"10.1109/CCST.2004.1405391","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405391","url":null,"abstract":"A new method for off-line handwritten signature verification is described in this paper. It is compared with four different parameterization techniques using support vector machines (SVM) as a classification system. The results show which one is the most suitable parameterization technique for this system.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127106316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Izquierdo-Fuente, J. Villacorta-Calvo, M. Raboso-Mateos, A. Martines-Arribas, D. Rodriguez-Merino, L. del Val-Puente
{"title":"A human classification system for a video-acoustic detection platform","authors":"A. Izquierdo-Fuente, J. Villacorta-Calvo, M. Raboso-Mateos, A. Martines-Arribas, D. Rodriguez-Merino, L. del Val-Puente","doi":"10.1109/CCST.2004.1405383","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405383","url":null,"abstract":"In this paper we present a complete classification system that uses information obtained from several media devices. The definition of tasks and events managed by the core module allows that the system can be adapted, changing the how the system works or adding new modules. The use of a classification module allows the human supervision contributing with greater reliability.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129943253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial identification using transformed domain by SVM","authors":"C. Travieso, J. B. Alonso, M. Ferrer","doi":"10.1109/CCST.2004.1405412","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405412","url":null,"abstract":"In this paper, we propose a facial biometric identification system, using transformed domains such as discrete cosine transforms (DCT), fast Fourier transforms (FFT) and discrete wavelets transforms (DWT). As novel classifier system has been utilized a support vector machines (SVM) (Burges, 1998), and in addition, the way of computing transformed coefficients. With the above system, it has been obtained a simple and robust system with good results, upper to 98% with the ORL face database (400 images) from Olivetti Research Laboratory.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123370384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intruder detection systems for water-hatches at reservoir sites","authors":"R. Chowdhury, S. Tarr","doi":"10.1109/CCST.2004.1405384","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405384","url":null,"abstract":"Security-hatch covers provide secure access for staff to underground assets that require protection. In the context of the water-industry, these hatches are used as an access point to reservoirs containing freshly treated drinking water. Access to reservoirs is required for valve repair and routine maintenance such as reservoir cleaning. The use of intruder detection systems is important, as there is a threat of contamination by toxic substances to freshly treated drinking water and of extortion by the threat of contamination. The Police Scientific Development Branch (PSDB) has evaluated security-hatch intruder detection systems for use by the water industry. The effectiveness of two detection systems was assessed when mounted inside a security-hatch and the hatch itself subjected to physical attack. A range of attack styles were 'weighted' based on their perceived likelihood, and an overall probability of detection was calculated for each system. This paper describes the technology behind intruder detection systems for protecting often remote, unattended water-hatches. It describes the capability of such systems for the protection of these hatches such as the false alarm performance, probability of detection and deployment methods.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127782190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combating transnational crime: management education at the International Law Enforcement Academy (ILEA)","authors":"R. A. Kromer, F. R. Taylor","doi":"10.1109/CCST.2004.1405379","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405379","url":null,"abstract":"This paper provides a detailed description of the overall concept, curriculum, and logistical support of the International Law Enforcement Academy at Roswell, New Mexico operated on behalf of the US Department of State's Bureau for International Narcotics and Law Enforcement Affairs. The Department of State is responsible for the operation of a network of law enforcement academies which are designed to increase the capability of the foreign students to combat crime. The Academy at Roswell sponsors the Advanced Management Course, which is designed to increase the managerial capabilities of the mid-level law enforcement managers from foreign states to combat crime, institute democratic practices, and facilitate cooperation with US international law enforcement agencies in order to successfully counter transnational criminal elements. This paper is divided into four parts. Part One describes the history of the Department of State's program and its component parts. Part Two describes the learning objectives of the curriculum and provides an overview of its major elements, including the approach used to teach. Part Three provides an orientation on a typical day for the student, and Part Four explains course attendance and selection requirements.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126215439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security architecture for heterogeneous distributed computing systems","authors":"S. Naqvi, M. Riguidel","doi":"10.1109/CCST.2004.1405366","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405366","url":null,"abstract":"Distributed systems face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. The advent of reliable spontaneous networking technologies has ostensibly raised the stakes for the design of computing intensive environments using intelligent devices. As environmental intelligence grows, so will the number of heterogeneous devices connected to the environment. The creation of security and trust paradigms for such technology rich environments is today's great challenge. If the intelligent devices present in a smart environment act as gateways to some huge distributed computing system, then it is indispensable to sweep the threats out from these smart environments, so as to protect not only the local environment, but also the entire distributed system. This article proposes a design of consistent but fine-grained levels of trust and security in distributed systems, open to pervasive, mobile, heterogeneous networks featuring ambient intelligence by gradually virtualizing their security functions. These systems interact in various ways, with floating semantic interoperability between applications, interoperability of communications depending on shared links between those systems, and versatile interconnections. Threats and vulnerability vary according to different systems, objects, applications, and communication links. The salient features of this design include: consideration of duration and time factors in cryptographic protocols by introducing a trusted clock in the network; space for the security of distributed environments by context awareness in the system; mobility (security of mobile code, mobile agents and speed of movement); virtualization of security services.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129379273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}