Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Biometric-enabled authentication in 3G/WLAN systems 3G/WLAN系统中启用生物识别的身份验证
C. Dimitriadis, D. Polemi
{"title":"Biometric-enabled authentication in 3G/WLAN systems","authors":"C. Dimitriadis, D. Polemi","doi":"10.1109/CCST.2005.1594828","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594828","url":null,"abstract":"This paper proposes a secure and privacy friendly protocol, called Bio4G, for biometric-enabled authentication in combined 3G/WLAN systems. Bio4G provides real end-to-end strong user authentication to the mobile operator, requiring no storing or transferring of biometric data and eliminating the need for biometric enrolment and administration procedures, which are time-consuming for the user and expensive for the mobile and WLAN operators","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116903493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Visual tracking of targets in unrestricted environments 在不受限制的环境中对目标进行视觉跟踪
C. Guerra, M. Hernandez, D. Hernández, J. Isern
{"title":"Visual tracking of targets in unrestricted environments","authors":"C. Guerra, M. Hernandez, D. Hernández, J. Isern","doi":"10.1109/CCST.2005.1594861","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594861","url":null,"abstract":"Tracking is a basic process for security and surveillance problems that need to follow an object of interest during a certain period of time. Visual tracking algorithms based on pattern matching techniques constitute the basis of many, and the most used, current tracking systems (Brown, 1992). However, the main drawback of template matching consists in its lack of automatic adaptation to any environmental condition. Usually, the object of interest or the environment change their visual aspect and the template should, in a robust way, adapt to them. Therefore, a proper updating technique of the template is a crucial matter of all these systems. This paper proposes a new approach to the updating problem in order to achieve a better tracking performance and robustness. This is carried out by using an internal representation technique that makes use of second order isomorphisms (Shepard and Chipman, 1970). This allows to establish a representation space where an object of interest can be more easily distinguished from the representations of the objects of the context. The most important improvements of this approach are its parameter-free working, therefore no parameters have to be set manually in order to tune the process, and a better performance in robustness compared with other methods. Besides, objects to be tracked can be rigid or deformable, the system is adapted automatically to any situation","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124776827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving online banking security with hardware devices 通过硬件设备提高网上银行的安全性
F. Puente, J. D. Sandoval, P. Hernandez, C. J. Molina
{"title":"Improving online banking security with hardware devices","authors":"F. Puente, J. D. Sandoval, P. Hernandez, C. J. Molina","doi":"10.1109/CCST.2005.1594874","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594874","url":null,"abstract":"Even though it probably has never happened to us, it is possible to introduce our credit card on an ATM and have it steal the money from our account or access our bank account from a computer and have someone else getting access to it. In the first case we believe that the ATM is a trusted device and never tries to cheat us. In the second case, we believe that our computer provides a safe environment for electronic banking. Although there are a few records in history of ATM fraud, we generally believe that it won't happen to us. However, we all know that computers are not safe and still take the risk. Viruses and trojans (malicious software) can do all this and much more, not only in movies but in the real world. This is possible just because we are giving away all the information needed to access our money instead of keeping them. In the first case we are giving away our credit card and the PIN (personal identification number) and in the second case we are giving away our login and password/s. Anyone who can intercept this information can successfully pretend to be us and withdraw our money. Digital signature can solve these problems providing the means for validating a user or a given operation without exposing the data required to do it. However, the point is not if digital signature is the best way to protect our money, but how to implement the system in a way that is easy to use and safe enough. Here we propose some possible implementations based on the idea that not only digital signature is needed but also human interaction is required in order to avoid a classic man-in-the-middle-attack. It is not safe to introduce a smart card on a standard smart card reader, introduce the PIN on the application used to access it, and then expect the application to do exactly what we tell it to do. That would be perfectly fine in a world where we can trust each other and we can consider computers to be completely safe from intrusions. But the truth is unfortunately far from being like that and so we need to look for new ways to protect us from this kind of attacks. Several hardware devices are proposed based on a basic structure where we have a display, some way to input data (such as a keyboard or a few buttons) and some way to communicate with any computer","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127132969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Security analysis of and proposal for image-based authentication 基于图像认证的安全性分析与建议
R. Newman, P. Harsh, P. Jayaraman
{"title":"Security analysis of and proposal for image-based authentication","authors":"R. Newman, P. Harsh, P. Jayaraman","doi":"10.1109/CCST.2005.1594881","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594881","url":null,"abstract":"Most human authentication systems have been text-based. Recent psychological studies show users' inability to recall random character sequences. Image-based authentication systems have shown promise in circumventing this problem. In addition, they are more intuitive and user-friendly. This paper presents and analyzes a user authentication technique using images that can be used in local as well as remote authentication. We also consider TEMPEST and other forms of attack.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132892753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
An automatic monitoring approach for unsupervised parking lots in outdoors 一种室外无人看管停车场的自动监控方法
Chang-Hsing Lee, Ming-Gang Wen, Chin-Chuan Han, Dayong Kou
{"title":"An automatic monitoring approach for unsupervised parking lots in outdoors","authors":"Chang-Hsing Lee, Ming-Gang Wen, Chin-Chuan Han, Dayong Kou","doi":"10.1109/CCST.2005.1594862","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594862","url":null,"abstract":"A video-based monitoring approach for outdoor parking lots has been developed in this paper. Since parking lots located in outdoor were the open and widespread spaces, moving objects in grabbed images were too small to obtain the detail and recognized image for the object, identification, object behavior analysis, or illegal event alarming. A dual-camera device was designed and calibrated manually. Using the calibrated parameters, multiple target images with high quality can be grabbed from widespread open spaces. The tracking process for a specified target can be easily switched to another when multiple objects appear in the monitoring space. All of them are stored in video-based databases of DVR systems. In addition, the object images are processed for the furthermore retrieval. Some experimental results were given to show the validity of our proposed approaches","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122727894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A new graphic cryptosystem based on one-dimensional memory cellular automata 一种新的基于一维记忆元胞自动机的图形密码系统
G. Álvarez, A. Hernandez, L. Hernández, A. Martin, G. Rodriguez
{"title":"A new graphic cryptosystem based on one-dimensional memory cellular automata","authors":"G. Álvarez, A. Hernandez, L. Hernández, A. Martin, G. Rodriguez","doi":"10.1109/CCST.2005.1594842","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594842","url":null,"abstract":"A new graphic cryptosystem for encrypting images defined by any number of colors is presented. The cryptosystem is based on a one-dimensional reversible cellular automaton. The original and the encrypted image are defined by the same color palette and the decrypted image is identical to the original one, i.e., it has no loss of resolution nor definition. The cryptosystem is secure against the most important attacks: brute-force attacks, statistical attacks, chosen-plaintext attacks and known-plaintext attacks.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133248003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection 攻击树在数字内容版权保护电子商务协议安全分析中的应用
M. Higuero, Juanjo Unzilla, Eduardo Jacob, P. Sáiz, M. Aguado, D. Luengo
{"title":"Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection","authors":"M. Higuero, Juanjo Unzilla, Eduardo Jacob, P. Sáiz, M. Aguado, D. Luengo","doi":"10.1109/CCST.2005.1594865","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594865","url":null,"abstract":"Systems based on the use of watermarking techniques are seen in recent times as the most interesting solutions to provide means of protecting intellectual property rights in electronic commerce with digital contents environments. A key aspect of this secure e-commerce environment is security. It is important to be able to evaluate and to know the security level and the risks of the system providing these type of services, specially in open networks like Internet. 'Attack trees' technique has proved valid as a methodology for studying and analyzing the security of these distributed systems, and as a mean to compare the security level of similar schemes.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115852271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Battery-independent emergency illumination with RGB phosphors 使用RGB荧光粉的不依赖电池的应急照明
M. Saito, H. Kondo
{"title":"Battery-independent emergency illumination with RGB phosphors","authors":"M. Saito, H. Kondo","doi":"10.1109/MAES.2007.323293","DOIUrl":"https://doi.org/10.1109/MAES.2007.323293","url":null,"abstract":"Acrylic resins that emit red, green, or blue (RGB) phosphorescence were fabricated. Mixtures of an organic dye and green phosphor created bright afterglow emission in the spectral region from yellow to red, which were difficult to attain with conventional red phosphors. Rhodamine and kiton were suitable for converting green phosphorescence to orange or red fluorescence. The resins continued to glow in darkness for longer than 3 h after an excitation lamp had been turned off. This long-afterglow characteristic of the current dye/phosphor mixtures was in a remarkable contrast with the fast phosphorescence decay of the conventional red phosphors (10-20 min). These red afterglow resins improve visibility of emergency signs, and realize warm-colored illumination that provides a sense of security in darkness.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123876834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MLP trained to separate problem speakers provides improved features for speaker identification MLP训练分离问题说话者,为说话者识别提供了改进的功能
Andrew C. Morris, Dalei Wu, J. Koreman
{"title":"MLP trained to separate problem speakers provides improved features for speaker identification","authors":"Andrew C. Morris, Dalei Wu, J. Koreman","doi":"10.1109/CCST.2005.1594867","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594867","url":null,"abstract":"In automatic speech recognition (ASR) the non-linear data projection provided by a one hidden layer multilayer perceptron (MLP), trained to recognise phonemes, has previously been shown to provide feature enhancement which can substantially increase ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty. We also present a method for selecting the speakers used for MLP training which further improves identification performance.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124279701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Using hand knuckle texture for biometric identification 利用手指关节纹理进行生物识别
M. Ferrer, C. Travieso, J. B. Alonso
{"title":"Using hand knuckle texture for biometric identification","authors":"M. Ferrer, C. Travieso, J. B. Alonso","doi":"10.1109/ccst.2005.1594835","DOIUrl":"https://doi.org/10.1109/ccst.2005.1594835","url":null,"abstract":"In this paper is proposed a first approach of a novel and simple biometric verification system based on the texture of the hand knuckles. A knuckle image with scale, rotation and translation invariance is isolated from the hand recorded image with digital image processing techniques. The wrinkle of the knuckle images are extracted to a black and white image which is used as biometric feature. A hidden Markov model and a support vector machine are proposed as verifiers. A similar equal error rate of 0.094 is reached by both classifiers with our preliminary database consisting of 8 samples of 20 people hand.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116340409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信