{"title":"Adsorption/desorption GC assisted with retention index comparison of peaks for the identification of accelerants in fire residues","authors":"W.-T. Chang, Y. Giang, C. Wang, C.-W. Huang","doi":"10.1109/CCST.1993.386818","DOIUrl":"https://doi.org/10.1109/CCST.1993.386818","url":null,"abstract":"The authors present both an efficient sample preparation procedure and a highly discriminating gas chromatographic (GC) method for the identification of accelerants in fire residues. A purge-and-trap concentrator fitted with a carbotrap adsorbent tube was used to preconcentrate the accelerants from various fire residues. The resultant sample tubes were submitted to a thermal desorption unit (TDU) which was connected to a dual wide-bore capillary column GC. The identification of the accelerants was based on both a retention indices comparison and chromatogram pattern recognition. The advantages and disadvantages of this dynamic adsorption/desorption procedure were evaluated by comparison with other pretreatment procedures such as charcoal tube adsorption/CS/sub 2/ extraction and continuous steam distillation.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128609680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Tange, K. Kamata, H. Ohno, T. Asakura, T. Sunada
{"title":"WIDE (Wireless Integrated Digital Equipment) System","authors":"M. Tange, K. Kamata, H. Ohno, T. Asakura, T. Sunada","doi":"10.1109/CCST.1993.386803","DOIUrl":"https://doi.org/10.1109/CCST.1993.386803","url":null,"abstract":"To deal flexibly with interprefectural criminal cases, the National Police Agency (NPA) developed the mobile radio communication system, the WIDE (Wireless Integrated Digital Equipment) system. The WIDE system, which is usually used for telephone communications, provides a wholesale command function in the event of interprefectural criminal cases. Its wholesale command function makes it possible to build up an exclusive communication network transcending prefectural borders and covering all police vehicles concerned. The WIDE system is highly resistant to interception and is operated with a narrow occupied bandwidth of 8 kHz.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116712576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication and authorization techniques in distributed systems","authors":"C. Laferriere, R. Charland","doi":"10.1109/CCST.1993.386805","DOIUrl":"https://doi.org/10.1109/CCST.1993.386805","url":null,"abstract":"The authors consider the following techniques for performing the authentication of user identity and the granting of proper authorization in distributed environments: user login and routing constraints at the network level; special-purpose, challenge-response systems; private key based systems such as Kerberos; and public key based systems with smart cards. They describe and discuss the strengths and weaknesses (i.e., residual vulnerabilities) of each technique and provide guidance with respect to their applicability and deployment.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"57 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Future law enforcement and internal security communications architectures employing advanced technologies","authors":"G. M. Stone, K. Bluitt","doi":"10.1109/CCST.1993.386802","DOIUrl":"https://doi.org/10.1109/CCST.1993.386802","url":null,"abstract":"The requirements for advanced multi-dimensional tactical communications architectures are discussed. In addition, attention is given to practical means of specifying and quantifying advanced digital system performance in the planning, design, and implementation of these systems, and to the intelligence process needed to back-stop these technologies. A unified virtual architecture is considered. It is concluded that to be effective in this area, our use of technology must be guided by a master stratagem. Globally, this mindset requires both a policy and concept of operations integration of CI (counterintelligence) and OPSEC (operations security) and the migration to a communications architecture that facilitates seamless information transfer in a fashion that protects sensitive LE (law enforcement) and IS (internal security) operations.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on employing traditional Chinese medical knowledge in polygraphy technology","authors":"F.-G. Lee, Y.-Y. Wu, C. Chung","doi":"10.1109/CCST.1993.386834","DOIUrl":"https://doi.org/10.1109/CCST.1993.386834","url":null,"abstract":"A study has been carried out on the use of a polygraph to analyze the psychological reaction intensity difference between the acupoints and the other parts of the human body. The results of employing traditional Chinese medical knowledge in polygraphic technology are presented. The feasibility of the application of acupuncture to lie detection is examined.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125265584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Folinsbee, L. Pelkowitz, R. Ball, J. Blum, B. Lavigne
{"title":"Fast response CCTV image recall and motion detection","authors":"T. Folinsbee, L. Pelkowitz, R. Ball, J. Blum, B. Lavigne","doi":"10.1109/CCST.1993.386827","DOIUrl":"https://doi.org/10.1109/CCST.1993.386827","url":null,"abstract":"An Advanced Alarm Assessment System has resulted from the merging of two CCTV (closed-circuit television) related technologies: (1) a Presearch Image Capture System (PICS) which captures and displays images from before and after an intrusion alarm; and (b) an IMAGO series video sentry and target tracker which detects motion and, optionally, controls camera pan/tilt. The new technology MPICS (Motion PICS) was evaluated at a Canadian penitentiary. The system uses a transputer network with a distributed image frame store to yield fast recall from many cameras of the events leading up to, at the time of, and just after the alarm. The most likely causes of the alarm are indicated on the display to assist user decision-making. This is especially useful during periods of high alarm activity when many zones may alarm in rapid succession.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"67 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128975082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cryptographic system based upon the continued fraction","authors":"Wei-Bin Lee, Chin-Chen Chang, J. Jan","doi":"10.1109/CCST.1993.386798","DOIUrl":"https://doi.org/10.1109/CCST.1993.386798","url":null,"abstract":"The authors propose a cryptographic system in which the sender and the receiver hold the same secret key. The system is a one-key system while the RSA system is a public-key system in which the enciphering key and the deciphering key are not identical. The encoding function in the proposed system is based on a linear equation with two variables. The processes of encoding and decoding are simple in this system. The operations in the system include multiplication and addition only, thus making efficient ciphering possible.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131595672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmitting multiple secrets securely in broadcasting networks","authors":"C. -. Chang, D. Buehrer","doi":"10.1109/CCST.1993.386833","DOIUrl":"https://doi.org/10.1109/CCST.1993.386833","url":null,"abstract":"A method is presented which permits a broadcasting mechanism to securely transmit a single ciphertext with multiple messages. These messages will only be readable by those users who have the appropriate read key(s). The other messages will be undecipherable. This is a generalization of the secure broadcasting problem stated by G. H. Chiou and W. T. Chen (1989) and C. C. Chang and C. H. Lin (1988). The proposed generalized secure broadcasting cryptosystem is based on Newton's interpolating polynomials and the Chinese remainder theorem. It is observed that the key management by a Central Authority is simple. In order to broadcast distinct messages to different users, one is only required to construct a polynomial and to compute a constant. To reveal a message, the authorized receiver only has to reveal his key by taking the constant modulo his identification number, evaluate the received polynomial with the obtained key, and then decrypt the resulting ciphertext by using his secret key. The sender can randomly choose any number of users who are authorized to know distinct messages within one broadcast.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New ways of explosive booby traps at the international terroristic actions","authors":"O. Mueller","doi":"10.1109/CCST.1993.386819","DOIUrl":"https://doi.org/10.1109/CCST.1993.386819","url":null,"abstract":"The author classifies the various types of traditional and recent explosive booby traps (EBTs), and gives an interview of the international situation concerning EBTs. He clarifies some possible optimal ways to minimize the deadly applications of EBTs.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129357671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synergistic radar: Radioguard application and performance","authors":"K. Harman, G. Loubert, A. Gagnon","doi":"10.1109/CCST.1993.386811","DOIUrl":"https://doi.org/10.1109/CCST.1993.386811","url":null,"abstract":"The authors present test results for a number of new applications of RF cable sensors including use on a perimeter fence and laying on different surfaces as a rapid deployment line sensor. This includes the use of RadioGuard on the perimeter of roof tops. An algorithm for solving RadioGuard detects humans moving in proximity to a distributed antenna cable by monitoring disturbances to commercial FM radio signals. By utilizing the transmissions from a number of FM stations and the use of commercial FM radio receiver integrated circuits, RadioGuard provides reliable performance at an affordable price. The unique sensing cable, a modified commercially available TV twin lead, is a key to making this possible. Product design parameters as they relate to both cost and performance are discussed.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128867387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}