1993 Proceedings of IEEE International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Adsorption/desorption GC assisted with retention index comparison of peaks for the identification of accelerants in fire residues 吸附/解吸气相色谱法对火焰残留物中助燃剂的保留指数进行了峰间比较
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386818
W.-T. Chang, Y. Giang, C. Wang, C.-W. Huang
{"title":"Adsorption/desorption GC assisted with retention index comparison of peaks for the identification of accelerants in fire residues","authors":"W.-T. Chang, Y. Giang, C. Wang, C.-W. Huang","doi":"10.1109/CCST.1993.386818","DOIUrl":"https://doi.org/10.1109/CCST.1993.386818","url":null,"abstract":"The authors present both an efficient sample preparation procedure and a highly discriminating gas chromatographic (GC) method for the identification of accelerants in fire residues. A purge-and-trap concentrator fitted with a carbotrap adsorbent tube was used to preconcentrate the accelerants from various fire residues. The resultant sample tubes were submitted to a thermal desorption unit (TDU) which was connected to a dual wide-bore capillary column GC. The identification of the accelerants was based on both a retention indices comparison and chromatogram pattern recognition. The advantages and disadvantages of this dynamic adsorption/desorption procedure were evaluated by comparison with other pretreatment procedures such as charcoal tube adsorption/CS/sub 2/ extraction and continuous steam distillation.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128609680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
WIDE (Wireless Integrated Digital Equipment) System 无线综合数字设备系统
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386803
M. Tange, K. Kamata, H. Ohno, T. Asakura, T. Sunada
{"title":"WIDE (Wireless Integrated Digital Equipment) System","authors":"M. Tange, K. Kamata, H. Ohno, T. Asakura, T. Sunada","doi":"10.1109/CCST.1993.386803","DOIUrl":"https://doi.org/10.1109/CCST.1993.386803","url":null,"abstract":"To deal flexibly with interprefectural criminal cases, the National Police Agency (NPA) developed the mobile radio communication system, the WIDE (Wireless Integrated Digital Equipment) system. The WIDE system, which is usually used for telephone communications, provides a wholesale command function in the event of interprefectural criminal cases. Its wholesale command function makes it possible to build up an exclusive communication network transcending prefectural borders and covering all police vehicles concerned. The WIDE system is highly resistant to interception and is operated with a narrow occupied bandwidth of 8 kHz.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116712576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication and authorization techniques in distributed systems 分布式系统中的身份验证和授权技术
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386805
C. Laferriere, R. Charland
{"title":"Authentication and authorization techniques in distributed systems","authors":"C. Laferriere, R. Charland","doi":"10.1109/CCST.1993.386805","DOIUrl":"https://doi.org/10.1109/CCST.1993.386805","url":null,"abstract":"The authors consider the following techniques for performing the authentication of user identity and the granting of proper authorization in distributed environments: user login and routing constraints at the network level; special-purpose, challenge-response systems; private key based systems such as Kerberos; and public key based systems with smart cards. They describe and discuss the strengths and weaknesses (i.e., residual vulnerabilities) of each technique and provide guidance with respect to their applicability and deployment.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"57 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Future law enforcement and internal security communications architectures employing advanced technologies 采用先进技术的未来执法和内部安全通信架构
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386802
G. M. Stone, K. Bluitt
{"title":"Future law enforcement and internal security communications architectures employing advanced technologies","authors":"G. M. Stone, K. Bluitt","doi":"10.1109/CCST.1993.386802","DOIUrl":"https://doi.org/10.1109/CCST.1993.386802","url":null,"abstract":"The requirements for advanced multi-dimensional tactical communications architectures are discussed. In addition, attention is given to practical means of specifying and quantifying advanced digital system performance in the planning, design, and implementation of these systems, and to the intelligence process needed to back-stop these technologies. A unified virtual architecture is considered. It is concluded that to be effective in this area, our use of technology must be guided by a master stratagem. Globally, this mindset requires both a policy and concept of operations integration of CI (counterintelligence) and OPSEC (operations security) and the migration to a communications architecture that facilitates seamless information transfer in a fashion that protects sensitive LE (law enforcement) and IS (internal security) operations.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A study on employing traditional Chinese medical knowledge in polygraphy technology 中医知识在测谎技术中的应用研究
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386834
F.-G. Lee, Y.-Y. Wu, C. Chung
{"title":"A study on employing traditional Chinese medical knowledge in polygraphy technology","authors":"F.-G. Lee, Y.-Y. Wu, C. Chung","doi":"10.1109/CCST.1993.386834","DOIUrl":"https://doi.org/10.1109/CCST.1993.386834","url":null,"abstract":"A study has been carried out on the use of a polygraph to analyze the psychological reaction intensity difference between the acupoints and the other parts of the human body. The results of employing traditional Chinese medical knowledge in polygraphic technology are presented. The feasibility of the application of acupuncture to lie detection is examined.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125265584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast response CCTV image recall and motion detection 快速响应CCTV图像召回和运动检测
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386827
T. Folinsbee, L. Pelkowitz, R. Ball, J. Blum, B. Lavigne
{"title":"Fast response CCTV image recall and motion detection","authors":"T. Folinsbee, L. Pelkowitz, R. Ball, J. Blum, B. Lavigne","doi":"10.1109/CCST.1993.386827","DOIUrl":"https://doi.org/10.1109/CCST.1993.386827","url":null,"abstract":"An Advanced Alarm Assessment System has resulted from the merging of two CCTV (closed-circuit television) related technologies: (1) a Presearch Image Capture System (PICS) which captures and displays images from before and after an intrusion alarm; and (b) an IMAGO series video sentry and target tracker which detects motion and, optionally, controls camera pan/tilt. The new technology MPICS (Motion PICS) was evaluated at a Canadian penitentiary. The system uses a transputer network with a distributed image frame store to yield fast recall from many cameras of the events leading up to, at the time of, and just after the alarm. The most likely causes of the alarm are indicated on the display to assist user decision-making. This is especially useful during periods of high alarm activity when many zones may alarm in rapid succession.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"67 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128975082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cryptographic system based upon the continued fraction 一种基于连分式的密码系统
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386798
Wei-Bin Lee, Chin-Chen Chang, J. Jan
{"title":"A cryptographic system based upon the continued fraction","authors":"Wei-Bin Lee, Chin-Chen Chang, J. Jan","doi":"10.1109/CCST.1993.386798","DOIUrl":"https://doi.org/10.1109/CCST.1993.386798","url":null,"abstract":"The authors propose a cryptographic system in which the sender and the receiver hold the same secret key. The system is a one-key system while the RSA system is a public-key system in which the enciphering key and the deciphering key are not identical. The encoding function in the proposed system is based on a linear equation with two variables. The processes of encoding and decoding are simple in this system. The operations in the system include multiplication and addition only, thus making efficient ciphering possible.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131595672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transmitting multiple secrets securely in broadcasting networks 在广播网络中安全地传输多个秘密
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386833
C. -. Chang, D. Buehrer
{"title":"Transmitting multiple secrets securely in broadcasting networks","authors":"C. -. Chang, D. Buehrer","doi":"10.1109/CCST.1993.386833","DOIUrl":"https://doi.org/10.1109/CCST.1993.386833","url":null,"abstract":"A method is presented which permits a broadcasting mechanism to securely transmit a single ciphertext with multiple messages. These messages will only be readable by those users who have the appropriate read key(s). The other messages will be undecipherable. This is a generalization of the secure broadcasting problem stated by G. H. Chiou and W. T. Chen (1989) and C. C. Chang and C. H. Lin (1988). The proposed generalized secure broadcasting cryptosystem is based on Newton's interpolating polynomials and the Chinese remainder theorem. It is observed that the key management by a Central Authority is simple. In order to broadcast distinct messages to different users, one is only required to construct a polynomial and to compute a constant. To reveal a message, the authorized receiver only has to reveal his key by taking the constant modulo his identification number, evaluate the received polynomial with the obtained key, and then decrypt the resulting ciphertext by using his secret key. The sender can randomly choose any number of users who are authorized to know distinct messages within one broadcast.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New ways of explosive booby traps at the international terroristic actions 新的爆炸饵雷方式针对国际恐怖主义行动
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386819
O. Mueller
{"title":"New ways of explosive booby traps at the international terroristic actions","authors":"O. Mueller","doi":"10.1109/CCST.1993.386819","DOIUrl":"https://doi.org/10.1109/CCST.1993.386819","url":null,"abstract":"The author classifies the various types of traditional and recent explosive booby traps (EBTs), and gives an interview of the international situation concerning EBTs. He clarifies some possible optimal ways to minimize the deadly applications of EBTs.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129357671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Synergistic radar: Radioguard application and performance 协同雷达:Radioguard的应用和性能
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386811
K. Harman, G. Loubert, A. Gagnon
{"title":"Synergistic radar: Radioguard application and performance","authors":"K. Harman, G. Loubert, A. Gagnon","doi":"10.1109/CCST.1993.386811","DOIUrl":"https://doi.org/10.1109/CCST.1993.386811","url":null,"abstract":"The authors present test results for a number of new applications of RF cable sensors including use on a perimeter fence and laying on different surfaces as a rapid deployment line sensor. This includes the use of RadioGuard on the perimeter of roof tops. An algorithm for solving RadioGuard detects humans moving in proximity to a distributed antenna cable by monitoring disturbances to commercial FM radio signals. By utilizing the transmissions from a number of FM stations and the use of commercial FM radio receiver integrated circuits, RadioGuard provides reliable performance at an affordable price. The unique sensing cable, a modified commercially available TV twin lead, is a key to making this possible. Product design parameters as they relate to both cost and performance are discussed.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128867387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信