IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.最新文献

筛选
英文 中文
A research of information and communication security forensic mechanism in Taiwan 台湾地区信息通信安全取证机制研究
I. Lin, Tian-Shing Lan, Jianpeng Wu
{"title":"A research of information and communication security forensic mechanism in Taiwan","authors":"I. Lin, Tian-Shing Lan, Jianpeng Wu","doi":"10.1109/CCST.2003.1297530","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297530","url":null,"abstract":"With the rapid development of network technology, Internet security information and communication security, crime is becoming a serious problem. According to the data, those who commit crimes in cybersociety are rarely found guilty. This is because there is no professional information or communication security forensic organization. In addition, the legal procedures to deal with digital evidence are not accepted by judges. As we know, although there is a complete criminal investigation forensic mechanism, it lacks a complete computer forensic mechanism for cybercrime investigation. Establishing an information and communication security forensic mechanism is crucial. Formulating an adequate plan and strengthening the current information and communication security environment would help to fight crime. Furthermore, cultivating professions actively with a professional office or laboratory, and building up a standard for digital evidence would be useful to officers in charge, as it would enhance the ability of information and communication security forensic work.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126663835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new security key exchange channel for 802.11 WLANs 802.11 wlan的新安全密钥交换通道
Y. Ouyang, R. Chang, Ji-Hau Chiu
{"title":"A new security key exchange channel for 802.11 WLANs","authors":"Y. Ouyang, R. Chang, Ji-Hau Chiu","doi":"10.1109/CCST.2003.1297562","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297562","url":null,"abstract":"Recently, public wireless local area network systems based on IEEE 802.11 are becoming popular in hot spot areas such as airports, department store, etc. The 802.1X and 802.11i were proposed to resolve some problems in 802.11. However, the 802. 1x still has some drawbacks and could be hijacked through middle of communication session. The main problems in the wireless LANs security standards are the key distribution and mutual authentication between the supplicant and the access point (AP). We propose another scheme to construct a secure channel for regular communication security. To aim at above, we propose a security key exchange scheme to avoid flaws and drawbacks. The prime purpose is to create a secure channel between supplicant and AP. Therefore, supplicant and AP need to compute session key individually. This scheme needs three phases and all steps of the phases are finished by public-key encryption. Thus, no information will be gotten between supplicant and server or between AP and server.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129448595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Automatic biometric identification system by hand geometry 自动生物识别系统由手几何
S. González, C. Travieso, J. B. Alonso, M. Ferrer
{"title":"Automatic biometric identification system by hand geometry","authors":"S. González, C. Travieso, J. B. Alonso, M. Ferrer","doi":"10.1109/CCST.2003.1297573","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297573","url":null,"abstract":"We propose a novel and simple method to recognize individuals based on their hand-palm geometry. A compact set of parameters has been extracted and reduced using different transformations. Two classification methods have been implemented: neural networks (NN) based on the commonly used multilayer perceptron (MLP) and the most nearby neighbor classifier (KNN). Results show that not complex algorithms are required in the classification phase to obtain high recognition values. In our simulations, rates beyond 99% have been achieved.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"13 41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115292579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Securing a restricted site - biometric authentication at entry point 保护受限制的站点-入口点的生物识别认证
E. Kukula, S. Elliott
{"title":"Securing a restricted site - biometric authentication at entry point","authors":"E. Kukula, S. Elliott","doi":"10.1109/CCST.2003.1297599","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297599","url":null,"abstract":"We evaluated the performance of a commercially available facial recognition algorithm for the verification of an individual's identity (1:1) across three illumination levels. Existing facial recognition technology from still or video sources is becoming a practical tool for law enforcement, security, and counter-terrorist applications despite the limitations of current technology. At this time, facial recognition holds promise and has been implemented in limited applications, but has not been exhaustively researched in adverse conditions, which has initiated continuing research aimed at improving algorithms to compare images or representations of images to recognize a suspect [Paul, R. (2002)]. This evaluation examines the influence of variances in illumination levels on the performance of a facial recognition algorithm, specifically with respect to factors of age, gender, ethnicity, facial characteristics, and facial obstructions.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131369930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Securing the biometric model 保护生物识别模型
A.C. Leniski, R. C. Skinner, S.F. McGann, S. Elliott
{"title":"Securing the biometric model","authors":"A.C. Leniski, R. C. Skinner, S.F. McGann, S. Elliott","doi":"10.1109/CCST.2003.1297601","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297601","url":null,"abstract":"We propose a structured methodology following a full vulnerability analysis of the general biometric model outlined by Mansfield and Wayman (2002). Based on this analysis, a new multidimensional paradigm named the biometric architecture & system security (BASS) model is proposed, which adds comprehensive security and management layers to the existing biometric model. The BASS model is a structured methodology that guides firms towards employing a solid foundation for any biometric system through the emphasis of security practices at the module and systems level, as well as the standardization of policies and procedures for continued operations.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128623986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Firearm dataloggers 火器数据记录仪
J. Sutcliff
{"title":"Firearm dataloggers","authors":"J. Sutcliff","doi":"10.1109/CCST.2003.1297586","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297586","url":null,"abstract":"We discuss the development of a versatile electronic data capture system. This system is unobtrusively fitted to the lethal or less-than-lethal firearms carried by armed police, security forces etc in the course of their duties. The system has the potential to increase accountability and the effectiveness of post incident evaluation by capturing secure, legally submitable digital evidence. This evidence can then be used to determine the users actions and those of persons challenged or fired upon. We specifically focus on firing event detection, synchronizing data capture to the firing event, inherent armoury inventory and tracking facilities and minimally invasive mounting systems. The system currently incorporates digital video and limited spatial sensing capabilities. We evaluate these and explore possible future developments such as GPS, telemetry and full 3D spatial tracking. The research project is being conducted with Partnership Venture grants from Durham University and with Durham University School of Engineering. Facilities and consultancy are being provided by Durham Constabulary Special Operations Department.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124507470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信