Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335547
Miguel A. Ferrer, A. Morales, C. Travieso, J. B. Alonso
The fusion of hand biometric traits has been a very active research topic since 2003. The first part of this paper presents a short summary of the technology on combining hand biometric traits. As the summary show a clear tendency on adding new hand based traits in order to increase the performance of the hand based biometric scheme, an experiment that combine hand geometry, palm print, finger texture and vein pattern of hand dorsum is presented.
{"title":"Combining hand biometric traits for personal identification","authors":"Miguel A. Ferrer, A. Morales, C. Travieso, J. B. Alonso","doi":"10.1109/CCST.2009.5335547","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335547","url":null,"abstract":"The fusion of hand biometric traits has been a very active research topic since 2003. The first part of this paper presents a short summary of the technology on combining hand biometric traits. As the summary show a clear tendency on adding new hand based traits in order to increase the performance of the hand based biometric scheme, an experiment that combine hand geometry, palm print, finger texture and vein pattern of hand dorsum is presented.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114796733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335535
J. Thompson, Craig Devine, Carinna Brown, S. Tarr
The UK Home Office Scientific Development Branch, in partnership with the Centre for the Protection of National Infrastructure, has been developing a suite of standards for the testing of barrier-mounted, ground-based, free-standing and rapidly deployable Perimeter Intruder Detection Systems (PIDS). These standards allow different technologies to be compared on a performance basis. Progress on development of these standards and subsequent evaluations is discussed. Particular emphasis is given to the new standard for rapidly deployable PIDS and the current ongoing trial of several free-standing PIDS, using a purpose-built evaluation area. The evaluation area is comprised of 100m long, 7m wide tarmac and gravel strips, which run parallel to each other and allow a comparison of the performance of the same PIDS technology types over different surfaces. This will be the first free-standing PIDS evaluation conducted against the newly developed evaluation standard. It is expected to yield results on the effects that different surfaces may have on the performance of free-standing PIDS.
{"title":"Standardised procedures for evaluating PIDS — An update","authors":"J. Thompson, Craig Devine, Carinna Brown, S. Tarr","doi":"10.1109/CCST.2009.5335535","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335535","url":null,"abstract":"The UK Home Office Scientific Development Branch, in partnership with the Centre for the Protection of National Infrastructure, has been developing a suite of standards for the testing of barrier-mounted, ground-based, free-standing and rapidly deployable Perimeter Intruder Detection Systems (PIDS). These standards allow different technologies to be compared on a performance basis. Progress on development of these standards and subsequent evaluations is discussed. Particular emphasis is given to the new standard for rapidly deployable PIDS and the current ongoing trial of several free-standing PIDS, using a purpose-built evaluation area. The evaluation area is comprised of 100m long, 7m wide tarmac and gravel strips, which run parallel to each other and allow a comparison of the performance of the same PIDS technology types over different surfaces. This will be the first free-standing PIDS evaluation conducted against the newly developed evaluation standard. It is expected to yield results on the effects that different surfaces may have on the performance of free-standing PIDS.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127664277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335546
Andrew H. Ryan, J. F. Cohn, S. Lucey, Jason M. Saragih, P. Lucey, F. de la Torre, Adam Rossi
Heightened concerns about the treatment of individuals during interviews and interrogations have stimulated efforts to develop “non-intrusive” technologies for rapidly assessing the credibility of statements by individuals in a variety of sensitive environments. Methods or processes that have the potential to precisely focus investigative resources will advance operational excellence and improve investigative capabilities. Facial expressions have the ability to communicate emotion and regulate interpersonal behavior. Over the past 30 years, scientists have developed human-observer based methods that can be used to classify and correlate facial expressions with human emotion. However, these methods have proven to be labor intensive, qualitative, and difficult to standardize. The Facial Action Coding System (FACS) developed by Paul Ekman and Wallace V. Friesen is the most widely used and validated method for measuring and describing facial behaviors. The Automated Facial Expression Recognition System (AFERS) automates the manual practice of FACS, leveraging the research and technology behind the CMU/PITT Automated Facial Image Analysis System (AFA) system developed by Dr. Jeffery Cohn and his colleagues at the Robotics Institute of Carnegie Mellon University. This portable, near real-time system will detect the seven universal expressions of emotion (figure 1), providing investigators with indicators of the presence of deception during the interview process. In addition, the system will include features such as full video support, snapshot generation, and case management utilities, enabling users to re-evaluate interviews in detail at a later date.
对个人在面谈和审讯期间所受待遇的高度关注,促使人们努力发展“非侵入性”技术,以便在各种敏感环境中迅速评估个人陈述的可信度。有可能精确集中调查资源的方法或流程将推进卓越的行动并提高调查能力。面部表情具有交流情绪和调节人际行为的能力。在过去的30年里,科学家们开发了基于人类观察者的方法,可以用来对面部表情与人类情绪进行分类和关联。然而,这些方法已被证明是劳动密集型的,定性的,难以标准化。由Paul Ekman和Wallace V. Friesen开发的面部动作编码系统(FACS)是测量和描述面部行为的最广泛使用和验证的方法。自动面部表情识别系统(AFERS)利用卡内基梅隆大学机器人研究所Jeffery Cohn博士及其同事开发的CMU/PITT自动面部图像分析系统(AFA)系统背后的研究和技术,使FACS的手动操作自动化。这种便携式、接近实时的系统将检测七种普遍的情绪表达(图1),为调查人员提供在采访过程中是否存在欺骗的指标。此外,该系统还将包括完整视频支持、快照生成和案例管理实用程序等功能,使用户能够在以后详细地重新评估面试。
{"title":"Automated Facial Expression Recognition System","authors":"Andrew H. Ryan, J. F. Cohn, S. Lucey, Jason M. Saragih, P. Lucey, F. de la Torre, Adam Rossi","doi":"10.1109/CCST.2009.5335546","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335546","url":null,"abstract":"Heightened concerns about the treatment of individuals during interviews and interrogations have stimulated efforts to develop “non-intrusive” technologies for rapidly assessing the credibility of statements by individuals in a variety of sensitive environments. Methods or processes that have the potential to precisely focus investigative resources will advance operational excellence and improve investigative capabilities. Facial expressions have the ability to communicate emotion and regulate interpersonal behavior. Over the past 30 years, scientists have developed human-observer based methods that can be used to classify and correlate facial expressions with human emotion. However, these methods have proven to be labor intensive, qualitative, and difficult to standardize. The Facial Action Coding System (FACS) developed by Paul Ekman and Wallace V. Friesen is the most widely used and validated method for measuring and describing facial behaviors. The Automated Facial Expression Recognition System (AFERS) automates the manual practice of FACS, leveraging the research and technology behind the CMU/PITT Automated Facial Image Analysis System (AFA) system developed by Dr. Jeffery Cohn and his colleagues at the Robotics Institute of Carnegie Mellon University. This portable, near real-time system will detect the seven universal expressions of emotion (figure 1), providing investigators with indicators of the presence of deception during the interview process. In addition, the system will include features such as full video support, snapshot generation, and case management utilities, enabling users to re-evaluate interviews in detail at a later date.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126557803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335550
W. Claycomb, Dongwan Shin
Directory services are corporate computing objects responsible for providing information about user accounts, computer accounts, contacts, etc. Virtual directories are powerful tools for consolidating this data, modifying it if necessary, and presenting it to the end user in a highly customized manner. While attacks against directory services have been identified, attacks and vulnerabilities of virtual directories remain largely unstudied. In this paper, we present an analysis of four types of attacks on virtual directory services. In doing so, we describe how each is performed, and discuss how to detect and prevent each type of attack. This first step towards protecting virtual directory services is critical to protecting the information contained in the source directories - information which could potentially contain sensitive data and be used for authentication and/or access control decisions.
{"title":"Threat modeling for virtual directory services","authors":"W. Claycomb, Dongwan Shin","doi":"10.1109/CCST.2009.5335550","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335550","url":null,"abstract":"Directory services are corporate computing objects responsible for providing information about user accounts, computer accounts, contacts, etc. Virtual directories are powerful tools for consolidating this data, modifying it if necessary, and presenting it to the end user in a highly customized manner. While attacks against directory services have been identified, attacks and vulnerabilities of virtual directories remain largely unstudied. In this paper, we present an analysis of four types of attacks on virtual directory services. In doing so, we describe how each is performed, and discuss how to detect and prevent each type of attack. This first step towards protecting virtual directory services is critical to protecting the information contained in the source directories - information which could potentially contain sensitive data and be used for authentication and/or access control decisions.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126044727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335562
W. Claycomb, Dongwan Shin
Secure device pairing between mobile devices is a challenging task. The lack of a trusted authority and low computational power make it difficult for mobile devices to establish secure communication channels in ubiquitous computing environments. Solutions have been proposed using locationlimited channels to transmit secure pairing information that can be verified as originating from the intended device, enabling users to establish secure channels over insecure mediums. Of particular interest is using audio as a location-limited channel, due to the widespread deployment of audio capabilities on mobile devices. We describe a solution for secure device pairing using audio, called UbiSound, which only requires a single audio transmission to authenticate both devices. We describe our communication protocol, implementation details and results, and discuss how our solution is resistant to a number of attacks. Additionally, we emphasize how our solution is usable for visually impaired users.
{"title":"Secure device pairing using audio","authors":"W. Claycomb, Dongwan Shin","doi":"10.1109/CCST.2009.5335562","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335562","url":null,"abstract":"Secure device pairing between mobile devices is a challenging task. The lack of a trusted authority and low computational power make it difficult for mobile devices to establish secure communication channels in ubiquitous computing environments. Solutions have been proposed using locationlimited channels to transmit secure pairing information that can be verified as originating from the intended device, enabling users to establish secure channels over insecure mediums. Of particular interest is using audio as a location-limited channel, due to the widespread deployment of audio capabilities on mobile devices. We describe a solution for secure device pairing using audio, called UbiSound, which only requires a single audio transmission to authenticate both devices. We describe our communication protocol, implementation details and results, and discuss how our solution is resistant to a number of attacks. Additionally, we emphasize how our solution is usable for visually impaired users.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133400107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335522
Wu Wei
The airport security information management system (ASIMS) has been playing very important role i preventing aircrafts from hijacking, terrorism attacks and other acts of unlawful interference. The system is designed to integrate a variety of security information of an airport into an organic body by analyzing and mining data collected form the security checkpoints and stored in central server database in order to supply proper information to the airport. With the development of aviation security technology, many advance security device are emerged and increase the security level significantly. But at the same time, mass data is poured into the existing ASIMS. The system raise higher requirement to data transmission and data-mining technologies. Based on the investigation and research on the existing ASIMS, the paper concludes the functions and configuration of the system used in airport and presents some problems of the system for further modifying when system is constructed and related standards are established. All the efforts are to make the system serve for the aviation security more efficient, safe and effective.
{"title":"The application research of airport security information management system on the field of civil aviation security","authors":"Wu Wei","doi":"10.1109/CCST.2009.5335522","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335522","url":null,"abstract":"The airport security information management system (ASIMS) has been playing very important role i preventing aircrafts from hijacking, terrorism attacks and other acts of unlawful interference. The system is designed to integrate a variety of security information of an airport into an organic body by analyzing and mining data collected form the security checkpoints and stored in central server database in order to supply proper information to the airport. With the development of aviation security technology, many advance security device are emerged and increase the security level significantly. But at the same time, mass data is poured into the existing ASIMS. The system raise higher requirement to data transmission and data-mining technologies. Based on the investigation and research on the existing ASIMS, the paper concludes the functions and configuration of the system used in airport and presents some problems of the system for further modifying when system is constructed and related standards are established. All the efforts are to make the system serve for the aviation security more efficient, safe and effective.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133660530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335525
R. Volner, V. Smrž, P. Bores
The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent web switching. Many intelligent systems focus on a specific security service, function, or device, and do not provide true end-to-end service network intelligence. True security network intelligence requires more than a set of disconnected elements, it requires an interconnecting and functionally coupled architecture that enables the various functional levels to interact and communicate with each other.
{"title":"Home system and personal health information management","authors":"R. Volner, V. Smrž, P. Bores","doi":"10.1109/CCST.2009.5335525","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335525","url":null,"abstract":"The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent web switching. Many intelligent systems focus on a specific security service, function, or device, and do not provide true end-to-end service network intelligence. True security network intelligence requires more than a set of disconnected elements, it requires an interconnecting and functionally coupled architecture that enables the various functional levels to interact and communicate with each other.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129634570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335541
R. Sánchez-Reillo, Ivan Rubio-Polo, R. Alonso-Moreno, Aitor Mendaza-Ormaza
Citizen Cards are being deployed nowadays. Several applications are being developed using such cards. Different kind of services can be provided with such cards, from services demanded by the Administration, to applications from private companies. Unfortunately there is a great amount of applications that are not able nowadays to use the security these cards offer, due to their requirement of keeping the end-user anonymous. This requirement can be forced by the kind of application (e.g. restricted to certain ages), of by data protection laws, where there is no need to access personal data to provide a local service. Authors are proposing in this paper two solutions for this kind of services, benefiting from the already deployed citizen cards, reducing the cost of developing a new card, as well as maintain the card system.
{"title":"Privacy friendly applications using citizen cards based on cryptographic smartcards","authors":"R. Sánchez-Reillo, Ivan Rubio-Polo, R. Alonso-Moreno, Aitor Mendaza-Ormaza","doi":"10.1109/CCST.2009.5335541","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335541","url":null,"abstract":"Citizen Cards are being deployed nowadays. Several applications are being developed using such cards. Different kind of services can be provided with such cards, from services demanded by the Administration, to applications from private companies. Unfortunately there is a great amount of applications that are not able nowadays to use the security these cards offer, due to their requirement of keeping the end-user anonymous. This requirement can be forced by the kind of application (e.g. restricted to certain ages), of by data protection laws, where there is no need to access personal data to provide a local service. Authors are proposing in this paper two solutions for this kind of services, benefiting from the already deployed citizen cards, reducing the cost of developing a new card, as well as maintain the card system.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335552
M. A. El-Iskandarani, S. Darwish, A. Abubahia
For digital image watermarking scheme, to be an effective tool for intellectual property protection, it must satisfy the requirements of image quality, watermark robustness and capacity, embedding security and extraction flexibility. Towards these requirements, this paper introduces a high-capacity second generation based blind watermarking scheme for protection of intellectual property, which takes the consideration of good image quality. In the proposed scheme, the host image is normalized by fast technique to resist geometric attacks and reduce the computational time. The normalized image is then transformed using parametric bi-orthogonal integer lifting wavelet transform (LWT) to increase security. The high-capacity watermark is embedded carefully into the salient features by utilizing least significant bits (LSBs) method to maximize the robustness and quality. Experimental results show the reliability of the proposed scheme against variety kinds of attacks including image processing attacks and geometric attacks.
{"title":"Capacity and quality improvement in blind second generation watermarking","authors":"M. A. El-Iskandarani, S. Darwish, A. Abubahia","doi":"10.1109/CCST.2009.5335552","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335552","url":null,"abstract":"For digital image watermarking scheme, to be an effective tool for intellectual property protection, it must satisfy the requirements of image quality, watermark robustness and capacity, embedding security and extraction flexibility. Towards these requirements, this paper introduces a high-capacity second generation based blind watermarking scheme for protection of intellectual property, which takes the consideration of good image quality. In the proposed scheme, the host image is normalized by fast technique to resist geometric attacks and reduce the computational time. The normalized image is then transformed using parametric bi-orthogonal integer lifting wavelet transform (LWT) to increase security. The high-capacity watermark is embedded carefully into the salient features by utilizing least significant bits (LSBs) method to maximize the robustness and quality. Experimental results show the reliability of the proposed scheme against variety kinds of attacks including image processing attacks and geometric attacks.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125233010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335556
Giovanni Contardi, F. Garzia, R. Cusani
The security of a complex site is strongly dependent on the use of integrated technological systems. Any weakness of the integrated system involves a weakness of the security of the site itself. For this reason it is necessary to design and realize highly integrated, efficient and reliable security systems. The authors illustrate the work made to design and realize the integrated security system of the Senate of the Italian Republic.)
{"title":"The integrated security system of the Senate of the Italian Republic","authors":"Giovanni Contardi, F. Garzia, R. Cusani","doi":"10.1109/CCST.2009.5335556","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335556","url":null,"abstract":"The security of a complex site is strongly dependent on the use of integrated technological systems. Any weakness of the integrated system involves a weakness of the security of the site itself. For this reason it is necessary to design and realize highly integrated, efficient and reliable security systems. The authors illustrate the work made to design and realize the integrated security system of the Senate of the Italian Republic.)","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130497429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}