1993 Proceedings of IEEE International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Forgery and tamper-proof identification document 伪造、防篡改的身份证明文件
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386835
S. Chow, N. Serinken, S. Shlien
{"title":"Forgery and tamper-proof identification document","authors":"S. Chow, N. Serinken, S. Shlien","doi":"10.1109/CCST.1993.386835","DOIUrl":"https://doi.org/10.1109/CCST.1993.386835","url":null,"abstract":"A novel technique for protecting identification documents (ID) against forgery and tampering is described. A security seal is printed beside the photograph on the face of the ID card. The security seal has the dimensions of a postage stamp and contains encrypted information derived from the photograph as well as alphanumeric information normally found on an ID card. It is used to verify the legitimacy of the ID card. The verification station consists of a scanner interfaced to a personal computer. During the verification process, the card is placed on the scanner, which transfers a digital representation of the card image to the computer. The information within the security seal is extracted and decoded using the public portion of the asymmetrical key and is then compared with the information derived from the face of the card including the photograph. A forgery is declared if the comparison fails. A fully functional prototype has been built and evaluated for variation of the hardware.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125477808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reduction of nuisance alarms in exterior sensors using ESP 使用ESP减少外部传感器的滋扰警报
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386793
E. J. Foley
{"title":"Reduction of nuisance alarms in exterior sensors using ESP","authors":"E. J. Foley","doi":"10.1109/CCST.1993.386793","DOIUrl":"https://doi.org/10.1109/CCST.1993.386793","url":null,"abstract":"Rain has always been a big problem for outdoor intrusion systems, making it necessary to choose between nuisance alarms and poor detection. The author reports on extensive environmental tests and describes a signal processing technique called ESP (enhanced signature processing). This effort produced a detection improvement of approximately 10 dB while suppressing the effects of rain-induced noise by an additional 12 dB. The evaluation technique used to investigate rain characteristics utilized a video tape recorder in which various Doppler signals from a K-band monostatic sensor were recorded on the audio channel of a video tape recorder while the actual rainy scene was recorded as video. The recorded signals were processed in the laboratory, and appropriate circuitry was developed utilizing the recorded information during the design phase.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128291461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks on ID-based signature scheme based upon Rabin's public key cryptosystem 基于Rabin公钥密码系统的id签名方案攻击
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386831
M.-K. Ko, T. Hwang, C. -. Chang
{"title":"Attacks on ID-based signature scheme based upon Rabin's public key cryptosystem","authors":"M.-K. Ko, T. Hwang, C. -. Chang","doi":"10.1109/CCST.1993.386831","DOIUrl":"https://doi.org/10.1109/CCST.1993.386831","url":null,"abstract":"Two attacks are given to show that the identity-based signature scheme proposed by C. C. Chang and C. H. Lin (1991) based upon Rabin's public key cryptosystem is not secure enough. One of the attacks is based on the conspiracy of two users in the system while the other can be performed by anyone alone. It is shown that, in this second attack, the scheme can be broken by anyone (not necessarily a user in the system) who has the ability to observe the communications between the signer and the receiver.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132153651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simple motion detection methods in TV image for security purposes 电视图像中用于安全目的的简单运动检测方法
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386828
M. Klima, P. Zahradnik, M. Novák, P. Dvorak
{"title":"Simple motion detection methods in TV image for security purposes","authors":"M. Klima, P. Zahradnik, M. Novák, P. Dvorak","doi":"10.1109/CCST.1993.386828","DOIUrl":"https://doi.org/10.1109/CCST.1993.386828","url":null,"abstract":"The authors present some simple detection procedures and algorithms for TV security systems implemented on a standard PC for detection and localization of targets. The approach is based on motion detection and target identification procedures suitable for fast and efficient image processing on relatively simple hardware. Both the classical approach (spatiotemporal filtering) and a neural-network-oriented alternative (Kohonen map) are discussed.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130098635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Concrete at high temperatures above 1000/spl deg/C 1000℃以上高温下的混凝土
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386790
W.-T. Chang, Y. Giang, C. Wang, C.-W. Huang
{"title":"Concrete at high temperatures above 1000/spl deg/C","authors":"W.-T. Chang, Y. Giang, C. Wang, C.-W. Huang","doi":"10.1109/CCST.1993.386790","DOIUrl":"https://doi.org/10.1109/CCST.1993.386790","url":null,"abstract":"Ordinary concrete samples made from the most common Portland Type I cement as well as some uncommon glossy-looking concrete lumps collected from an actual fire scene have been examined using thermal gravity analysis (TGA), differential thermal analysis (DTA), X-ray diffraction, and scanning electron microscope/energy dispersive X-ray spectrometry (SEM/EDX) with the aid of an unsealed furnace. Changes in crystallography, color, appearance, shape, density, and elemental composition with respect to temperature are carefully examined. Concrete rapidly losses all of its strength when exposed to high temperatures above 900/spl deg/C. As the temperature exceed 1200/spl deg/C, concrete tends to melt and yield numerous lumps or awls, even though each of its components has an extremely high melting point. The atmospheric current and the classes and amounts of the combustible materials at the fire scene as well as the structure of the construction can further influence the distribution of the lumps or awls. It is therefore very important for fire fighters and fire investigators to be aware of these aspects so as to do a safer and better job. A sufficient amount of high molecular-weight organic polymers with the aid of a good air supply is most likely to result in high temperatures exceeding 1200/spl deg/C.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130046079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Considerations in outdoor intrusion sensor testing 户外入侵传感器测试的注意事项
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386823
M. Maki
{"title":"Considerations in outdoor intrusion sensor testing","authors":"M. Maki","doi":"10.1109/CCST.1993.386823","DOIUrl":"https://doi.org/10.1109/CCST.1993.386823","url":null,"abstract":"The author reviews the role of a test site for outdoor intrusion sensor testing in a commercial environment and describes its application to sensor research, development, product verification, and training. Elements of a test site are reviewed along with its varied uses in the bringing of new sensors to market and performing comparative analyses of existing technologies. Particular references and examples relating to the Senstar SITE (Sensor Integrated Test Environment) are used for illustration of a site structure and function.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130436385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Acoustic aircraft detection sensor 声波飞机探测传感器
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386813
D. Chiang, W. Fishbein, D. Sheppard
{"title":"Acoustic aircraft detection sensor","authors":"D. Chiang, W. Fishbein, D. Sheppard","doi":"10.1109/CCST.1993.386813","DOIUrl":"https://doi.org/10.1109/CCST.1993.386813","url":null,"abstract":"A great deal of illicit cargo enters the United States on small, fixed wing, propeller-driven aircraft. Acoustic sensors are capable of detecting, recognizing, and locating low flying fixed wing aircraft even when the aircraft are not within line of sight. The authors present the technology principles for the design of an acoustic aircraft detection sensor, including prediction of detection range, atmospheric propagation effects, signal processing algorithms, microphone characteristics, and data transmission alternatives. Data obtained with an experimental acoustic sensor system were used to evaluate detection and tracking algorithms. The results of the evaluation are presented.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115540741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Installation of external intrusion detectors in harsh environments 在恶劣环境下安装外部入侵探测器
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386822
T. M. Andrews
{"title":"Installation of external intrusion detectors in harsh environments","authors":"T. M. Andrews","doi":"10.1109/CCST.1993.386822","DOIUrl":"https://doi.org/10.1109/CCST.1993.386822","url":null,"abstract":"The installation of external intrusion detectors in the Australian environment is considered, taking into account topography, climate, and local fauna specific to Australia. The author considers a number of difficult sites experienced and the techniques and on-site testing used to ensure satisfactory installation. Attention is given to the installation of external passive infrared detectors, infrared lighting, video motion detection, and both active and passive buried line systems.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"22 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120823537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The potential of intelligent vehicle highway systems for enhanced traveler security 智能车辆公路系统在提高出行安全方面的潜力
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386815
D. Caskey
{"title":"The potential of intelligent vehicle highway systems for enhanced traveler security","authors":"D. Caskey","doi":"10.1109/CCST.1993.386815","DOIUrl":"https://doi.org/10.1109/CCST.1993.386815","url":null,"abstract":"The author addresses some of the possible security functions that could be applied to transit systems by utilizing the availability of automatic vehicle location systems, broadband digital communication systems, and other IVHS (intelligent vehicle highway systems) functions. Emphasis is placed on the opportunities for security enhancements under the IVHS component for transit, called Advanced Public Transportation Systems (APTS). Attention is given to such security measures as covert open mike, slow-scan TV, electronic fare collection and intermodal facilities.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122642117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Risk-based approach to design and maintenance of alarm systems for security 基于风险的安全报警系统设计和维护方法
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386792
T. Kohda, K. Inoue
{"title":"Risk-based approach to design and maintenance of alarm systems for security","authors":"T. Kohda, K. Inoue","doi":"10.1109/CCST.1993.386792","DOIUrl":"https://doi.org/10.1109/CCST.1993.386792","url":null,"abstract":"Risk-based approaches to the design and maintenance of an alarm system for security are presented. Based on the values of its sensors, the security alarm system identifies all enemies entering the system. In the design problem, a simple systematic method is given to obtain the minimal combination of sensors that can identify all enemies with the minimal error risk. In the maintenance problem, a simple decision criterion is given to determine the maintenance time, considering the loss caused by failure of the security alarm system and unnecessary protective actions.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128713655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信