首页 > 最新文献

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.最新文献

英文 中文
Secure identity authentication and logical access control for airport information systems 机场信息系统的安全身份认证和逻辑访问控制
M. David, G. Hussein, K. Sakurai
We propose identity authentication by using a contactless smart card (CSC) with multiple biometric features for secure logical access to improve airport security. Proper identification of a cardholder with reliable data securely stored in a CSC provides a means to validate and audit access into a computer or communications network. We recommend the CSC because it facilitates fast, secure physical access to airport facilities, and offers lower mechanical complexity of the reader/writer (r/w) unit, thereby affording higher reliability and less field maintenance. The two-stage random number generator (TSRG) cryptosystem hybrid scheme algorithm is proposed for secure identity authentication between the cardholder and the workstation. This hybrid cryptosystem is based on an attack-oriented design to satisfy all security services. For enrollment, the user's live biometrics is scanned and, the unique characteristics are extracted from the biometric image to create the user's biometric template. The TSRG cryptosystem generates the appropriate seed that is called basic random data, random key and data key. Using the previous random data, instantaneous real time one time pad (OTP)-like data with lengths equal to that of the template is generated and combined with the template, then encrypted using the data key. A collision resistant hashing scheme is used for hashing the encrypted template to be used in the signature. The hash value is appended to the random key and data key. To generate the signature block, these three values are encrypted using the public key algorithm. The result is concatenated with the encrypted basic random data and template then stored in the smart card. For authenticating the user, the smart card is positioned onto a reader/writer. The stored file of the encrypted biometric template is retrieved. The identity verification process starts with placing the user's biometric feature on the scanner. The unique characteristics are extracted from the biometric image to create the users "live" biometric template. This new template is then compared with the template previously and a numeric matching score is generated, based on the percent of matching between the live and stored template. System designers determine the threshold value for this identity verification score based upon the security threat to the system.
我们建议使用具有多种生物特征的非接触式智能卡(CSC)进行身份认证,以实现安全的逻辑访问,以提高机场安全性。使用安全存储在CSC中的可靠数据对持卡人进行正确识别,提供了验证和审计进入计算机或通信网络的访问的方法。我们推荐CSC,因为它有助于快速,安全的物理访问机场设施,并提供较低的读写器(r/w)单元的机械复杂性,从而提供更高的可靠性和更少的现场维护。提出了一种两阶段随机数生成器(TSRG)密码混合方案算法,用于持卡人与工作站之间的安全身份认证。这种混合密码系统基于面向攻击的设计,以满足所有安全服务。注册时,扫描用户的实时生物特征,并从生物特征图像中提取独特特征,以创建用户的生物特征模板。TSRG密码系统生成相应的种子,称为基本随机数据、随机密钥和数据密钥。使用之前的随机数据,生成长度等于模板的即时实时一次性填充(OTP)类数据,并与模板组合,然后使用数据密钥进行加密。对签名中使用的加密模板进行哈希时,使用了抗碰撞哈希方案。哈希值被附加到随机键和数据键后。为了生成签名块,使用公钥算法对这三个值进行加密。结果与加密的基本随机数据和模板连接,然后存储在智能卡中。为了验证用户身份,智能卡被放置在读写器上。检索存储的加密生物特征模板文件。身份验证过程首先将用户的生物特征放在扫描仪上。从生物特征图像中提取独特的特征,创建用户“活”的生物特征模板。然后将这个新模板与以前的模板进行比较,并根据活动模板和存储模板之间的匹配百分比生成一个数字匹配分数。系统设计人员根据对系统的安全威胁确定此身份验证分数的阈值。
{"title":"Secure identity authentication and logical access control for airport information systems","authors":"M. David, G. Hussein, K. Sakurai","doi":"10.1109/CCST.2003.1297578","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297578","url":null,"abstract":"We propose identity authentication by using a contactless smart card (CSC) with multiple biometric features for secure logical access to improve airport security. Proper identification of a cardholder with reliable data securely stored in a CSC provides a means to validate and audit access into a computer or communications network. We recommend the CSC because it facilitates fast, secure physical access to airport facilities, and offers lower mechanical complexity of the reader/writer (r/w) unit, thereby affording higher reliability and less field maintenance. The two-stage random number generator (TSRG) cryptosystem hybrid scheme algorithm is proposed for secure identity authentication between the cardholder and the workstation. This hybrid cryptosystem is based on an attack-oriented design to satisfy all security services. For enrollment, the user's live biometrics is scanned and, the unique characteristics are extracted from the biometric image to create the user's biometric template. The TSRG cryptosystem generates the appropriate seed that is called basic random data, random key and data key. Using the previous random data, instantaneous real time one time pad (OTP)-like data with lengths equal to that of the template is generated and combined with the template, then encrypted using the data key. A collision resistant hashing scheme is used for hashing the encrypted template to be used in the signature. The hash value is appended to the random key and data key. To generate the signature block, these three values are encrypted using the public key algorithm. The result is concatenated with the encrypted basic random data and template then stored in the smart card. For authenticating the user, the smart card is positioned onto a reader/writer. The stored file of the encrypted biometric template is retrieved. The identity verification process starts with placing the user's biometric feature on the scanner. The unique characteristics are extracted from the biometric image to create the users \"live\" biometric template. This new template is then compared with the template previously and a numeric matching score is generated, based on the percent of matching between the live and stored template. System designers determine the threshold value for this identity verification score based upon the security threat to the system.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"52 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120917740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Vessel identification and monitoring systems for maritime security 海上安全船舶识别和监视系统
Shwu-Jing Chang
Maritime security has become major concerns of all coastal states, and the fundamental requirement is "maritime domain awareness" via identification, tracking and monitoring of vessels within their waters. We first identify candidate technologies and systems for different types of vessels. These systems have been designed and provided with regulatory framework for other reasons such as sustainable fishery, search and rescue, environmental protection, navigational safety, etc. We then present the results of a feasibility study on the application and integration of the technologies and facilities of these systems for maritime security. The technologies such as automatic identification systems (AIS), Inmarsat-C, and digital selective calling (DSC) and GSM are investigated with regard to the propagation/coverage, cost, reliability, etc. based on sea trials and field tests of prototype subsystems. Finally, we propose an integrated vessel identification and monitoring system and present a prototype system to demonstrate the display and fusion of targets from various sources including radar surveillance.
海上安全已成为各沿岸国关注的重大问题,实现海上安全的根本要求是实现“海域意识”,对在其水域内航行的船舶进行识别、跟踪和监测。我们首先为不同类型的船舶确定候选技术和系统。这些系统的设计和提供监管框架是出于其他原因,如可持续渔业、搜救、环境保护、航行安全等。然后,我们介绍了这些系统的技术和设施在海上安全方面的应用和集成的可行性研究结果。在原型子系统海上试验和现场试验的基础上,对自动识别系统(AIS)、Inmarsat-C、数字选择性呼叫(DSC)和GSM等技术进行了传播/覆盖、成本、可靠性等方面的研究。最后,我们提出了一个集成的船舶识别和监测系统,并给出了一个原型系统来演示来自包括雷达监视在内的各种来源的目标的显示和融合。
{"title":"Vessel identification and monitoring systems for maritime security","authors":"Shwu-Jing Chang","doi":"10.1109/CCST.2003.1297537","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297537","url":null,"abstract":"Maritime security has become major concerns of all coastal states, and the fundamental requirement is \"maritime domain awareness\" via identification, tracking and monitoring of vessels within their waters. We first identify candidate technologies and systems for different types of vessels. These systems have been designed and provided with regulatory framework for other reasons such as sustainable fishery, search and rescue, environmental protection, navigational safety, etc. We then present the results of a feasibility study on the application and integration of the technologies and facilities of these systems for maritime security. The technologies such as automatic identification systems (AIS), Inmarsat-C, and digital selective calling (DSC) and GSM are investigated with regard to the propagation/coverage, cost, reliability, etc. based on sea trials and field tests of prototype subsystems. Finally, we propose an integrated vessel identification and monitoring system and present a prototype system to demonstrate the display and fusion of targets from various sources including radar surveillance.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131434876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Testing and evaluating counterterrorism technology 测试和评估反恐技术
S.G. King, J. Stewart, T.M. Wood
We detail the Operational Test and Evaluation Program (OTEP) at the U.S. National Guard Bureau's (NGB) Center for National Response (CNR). OTEP's mission is to evaluate the utility of equipment, technology, and apparatus to materially aid emergency responders in a weapons of mass destruction (WMD) environment. The goal is twofold. First, to allow emergency responders to operationally test equipment in a realistic WMD environment, prior to purchase, so that they are able to resourcefully identify equipment that meets their needs and enables them to complete their mission. Second, to provide the manufacturers with test results and feedback from the testing organization, which presents them with product strengths, as well as ways in which they can improve their product.
我们在美国国民警卫队(NGB)国家反应中心(CNR)详细介绍了作战测试和评估计划(OTEP)。OTEP的任务是评估在大规模杀伤性武器(WMD)环境中为紧急救援人员提供物质援助的设备、技术和仪器的效用。目标是双重的。首先,允许应急人员在购买之前在实际的大规模杀伤性武器环境中对设备进行操作测试,以便他们能够足智多能地确定满足其需求并使其能够完成任务的设备。第二,向制造商提供测试结果和测试机构的反馈,向他们展示产品的优势,以及他们可以改进产品的方法。
{"title":"Testing and evaluating counterterrorism technology","authors":"S.G. King, J. Stewart, T.M. Wood","doi":"10.1109/CCST.2003.1297527","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297527","url":null,"abstract":"We detail the Operational Test and Evaluation Program (OTEP) at the U.S. National Guard Bureau's (NGB) Center for National Response (CNR). OTEP's mission is to evaluate the utility of equipment, technology, and apparatus to materially aid emergency responders in a weapons of mass destruction (WMD) environment. The goal is twofold. First, to allow emergency responders to operationally test equipment in a realistic WMD environment, prior to purchase, so that they are able to resourcefully identify equipment that meets their needs and enables them to complete their mission. Second, to provide the manufacturers with test results and feedback from the testing organization, which presents them with product strengths, as well as ways in which they can improve their product.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124021083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new proxy signature scheme based on dual complexities 一种基于双重复杂度的代理签名方案
J.J.-R. Chen, P. Sun, Chih-Lin Lin
The vogue of Internet, makes the changes of the people' s style. Security is one of the key elements of the development of Internet. Digital certification can take the place of identification and verification in virtual world constructed by computer network. MAMBO, USUDA, and OKAMOTO are the pioneers in the research of proxy signature and brings digital signature into a new direction. The original signer can authorize the proxy signers to act as agent via proxy signature scheme without leaking his/her private key. Most of the proposed scheme usually emphasize on the factuality of proxy signature. Some researchers take warrants to enhance the security of proxy signature scheme. The agent may sign many times after one legal authorization until the origin signer changed his/her password or grant periods. The others may need a secure channel to transmit parameters and it decrease practicability. This paper proposes a new proxy signature scheme that can set the grant period without using a warrant or a secure channel. Our scheme is based on the complexity of the discrete logarithm. We also make use of Denning's time stamp technology to solve the problem of the illegal using of proxy signature by illegal user.
互联网的流行,使人们的生活方式发生了变化。安全是互联网发展的关键因素之一。在计算机网络构建的虚拟世界中,数字认证可以代替身份识别和验证。MAMBO、USUDA和OKAMOTO是代理签名研究的先驱,将数字签名带入了一个新的方向。原始签名者可以通过代理签名方案授权代理签名者作为代理,而不会泄露其私钥。大多数提出的方案通常强调代理签名的真实性。一些研究者采用权证来提高代理签名方案的安全性。一次合法授权后,代理人可多次签名,直至原签名者更改密码或授权期限为止。其他的可能需要一个安全的通道来传输参数,这降低了实用性。本文提出了一种新的代理签名方案,该方案可以在不使用授权令或安全通道的情况下设置授权期限。我们的方案是基于离散对数的复杂性。我们还利用Denning时间戳技术解决了非法用户非法使用代理签名的问题。
{"title":"A new proxy signature scheme based on dual complexities","authors":"J.J.-R. Chen, P. Sun, Chih-Lin Lin","doi":"10.1109/CCST.2003.1297571","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297571","url":null,"abstract":"The vogue of Internet, makes the changes of the people' s style. Security is one of the key elements of the development of Internet. Digital certification can take the place of identification and verification in virtual world constructed by computer network. MAMBO, USUDA, and OKAMOTO are the pioneers in the research of proxy signature and brings digital signature into a new direction. The original signer can authorize the proxy signers to act as agent via proxy signature scheme without leaking his/her private key. Most of the proposed scheme usually emphasize on the factuality of proxy signature. Some researchers take warrants to enhance the security of proxy signature scheme. The agent may sign many times after one legal authorization until the origin signer changed his/her password or grant periods. The others may need a secure channel to transmit parameters and it decrease practicability. This paper proposes a new proxy signature scheme that can set the grant period without using a warrant or a secure channel. Our scheme is based on the complexity of the discrete logarithm. We also make use of Denning's time stamp technology to solve the problem of the illegal using of proxy signature by illegal user.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129068934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Millimeter wave control switch for secure giga-scale system 用于安全千兆级系统的毫米波控制开关
J. Fu, C. Cai, Y. Lu, Z. Shen
A driver-enhanced single pole double-throw (SPDT) switch was designed and implemented for secured giga-scale system. The design were simulated on advanced design system (ADS) package and implemented on RT-duriod 5880 with 10 mils thick dielectric substrate in a 3-port WR28 waveguide, to validate the design for broadband application in Ka-band of digital millimeter waves.
针对安全的千兆级系统,设计并实现了一种驱动增强型单极双掷(SPDT)开关。该设计在先进设计系统(ADS)封装上进行了仿真,并在rt -周期5880上实现,采用3端口WR28波导,10 mil厚介质衬底,验证了该设计在数字毫米波ka波段的宽带应用。
{"title":"Millimeter wave control switch for secure giga-scale system","authors":"J. Fu, C. Cai, Y. Lu, Z. Shen","doi":"10.1109/CCST.2003.1297542","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297542","url":null,"abstract":"A driver-enhanced single pole double-throw (SPDT) switch was designed and implemented for secured giga-scale system. The design were simulated on advanced design system (ADS) package and implemented on RT-duriod 5880 with 10 mils thick dielectric substrate in a 3-port WR28 waveguide, to validate the design for broadband application in Ka-band of digital millimeter waves.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114707376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Airport access control standards 机场出入管制标准
C. Wilkinson, E. Rao
This paper cover a major airport security focus since the tragic events of 9/11; namely employee access to secure areas, and the application of new technologies (biometrics and smart cards) to enhance airport security. The significance of access controls systems to airport security is apparent by several recent studies made by US federal oversight entities, which identified "unauthorized access" to secure areas as one of the highest potential vulnerability. As a consequence, deployment of biometrics and other new technologies were emphasized by US legislation shortly after 9-11. Although the new legislation for creating the US Transportation Security Administration focused on passengers and their baggage screening, equal importance was placed on airport access controls with potential new multipurpose applications such as a transportation worker identity card and trusted traveler card. Existing access control systems at US airports were based on a series of regulatory requirements and guidelines, which did not reflect this increased security requirement. Accordingly, a federal advisory committee under the RTCA (Radio and Technical Commission for Aeronautics) was established to set an appropriate set of guidelines and minimum standards to meet the new requirements. This paper discusses the process used to establish new guidelines and minimum standards, and the results of the process, and its importance to airports. The guidance provided various airport security stakeholders, namely airport operators, consultants and federal regulating agencies, on the areas of operational requirements, system and subsystem performance, system verification and validation are described. Critical technical issues such as nature of the credential, nature of the biometrics, and interoperability requirements within the USA and elsewhere, are elaborated. Finally, lessons learned from the previous generation of access control systems implementation difficulties: including poor specifications, environmental susceptibility, system verification, system phasing and limited planning for future technology, are discussed.
本文涵盖了自9/11悲剧事件以来主要的机场安全焦点;即允许员工进入安全区域,以及应用新技术(生物识别技术和智能卡)来加强机场的保安。美国联邦监管机构最近进行的几项研究表明,访问控制系统对机场安全的重要性显而易见,这些研究将“未经授权访问”安全区域确定为最高的潜在漏洞之一。因此,9-11事件后不久,美国立法强调了生物识别技术和其他新技术的部署。尽管建立美国运输安全管理局的新立法侧重于乘客及其行李检查,但同样重要的是机场访问控制,它具有潜在的新的多用途应用,如运输工人身份证和可信旅行者卡。美国机场现有的访问控制系统是基于一系列监管要求和指导方针,没有反映出这种增加的安全要求。因此,在航空无线电和技术委员会下成立了一个联邦咨询委员会,以制定一套适当的准则和最低标准,以满足新的要求。本文讨论了建立新的指导方针和最低标准的过程,以及该过程的结果,以及它对机场的重要性。该指南提供了各种机场安全利益相关者,即机场运营商、顾问和联邦监管机构,涉及运营要求、系统和子系统性能、系统验证和验证等领域。关键的技术问题,如凭证的性质,生物识别的性质,以及在美国和其他地方的互操作性要求,都进行了阐述。最后,讨论了从上一代访问控制系统实施困难中吸取的教训:包括差的规格,环境敏感性,系统验证,系统分阶段和对未来技术的有限规划。
{"title":"Airport access control standards","authors":"C. Wilkinson, E. Rao","doi":"10.1109/CCST.2003.1297577","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297577","url":null,"abstract":"This paper cover a major airport security focus since the tragic events of 9/11; namely employee access to secure areas, and the application of new technologies (biometrics and smart cards) to enhance airport security. The significance of access controls systems to airport security is apparent by several recent studies made by US federal oversight entities, which identified \"unauthorized access\" to secure areas as one of the highest potential vulnerability. As a consequence, deployment of biometrics and other new technologies were emphasized by US legislation shortly after 9-11. Although the new legislation for creating the US Transportation Security Administration focused on passengers and their baggage screening, equal importance was placed on airport access controls with potential new multipurpose applications such as a transportation worker identity card and trusted traveler card. Existing access control systems at US airports were based on a series of regulatory requirements and guidelines, which did not reflect this increased security requirement. Accordingly, a federal advisory committee under the RTCA (Radio and Technical Commission for Aeronautics) was established to set an appropriate set of guidelines and minimum standards to meet the new requirements. This paper discusses the process used to establish new guidelines and minimum standards, and the results of the process, and its importance to airports. The guidance provided various airport security stakeholders, namely airport operators, consultants and federal regulating agencies, on the areas of operational requirements, system and subsystem performance, system verification and validation are described. Critical technical issues such as nature of the credential, nature of the biometrics, and interoperability requirements within the USA and elsewhere, are elaborated. Finally, lessons learned from the previous generation of access control systems implementation difficulties: including poor specifications, environmental susceptibility, system verification, system phasing and limited planning for future technology, are discussed.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126869084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
And-CFAR and Or-CFAR detectors design in Weibull background 威布尔背景下的and - cfar和Or-CFAR检测器设计
W. Liu, X. Liu
The mathematical model of two novel constant false alarm rate (CFAR) detectors, the And-CFAR and Or-CFAR, are derived. The two new CFAR detectors improve the conventional cell averaging CFAR (CA-CFAR) and order statistics CFAR (OS-CFAR) by making full use of the cell information. The mathematical model has been validated.
推导了两种新型恒虚警率检测器(and -CFAR和Or-CFAR)的数学模型。这两种新的CFAR检测器通过充分利用单元信息,对传统的单元平均CFAR (CA-CFAR)和阶数统计CFAR (OS-CFAR)进行了改进。数学模型得到了验证。
{"title":"And-CFAR and Or-CFAR detectors design in Weibull background","authors":"W. Liu, X. Liu","doi":"10.1109/CCST.2003.1297540","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297540","url":null,"abstract":"The mathematical model of two novel constant false alarm rate (CFAR) detectors, the And-CFAR and Or-CFAR, are derived. The two new CFAR detectors improve the conventional cell averaging CFAR (CA-CFAR) and order statistics CFAR (OS-CFAR) by making full use of the cell information. The mathematical model has been validated.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124267245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A risk assessment system for multi-facility organizations 多设施组织的风险评估系统
T.M. Wood, S.G. King, J. Kennon
We describe a concept for a formalized system of analysis tools intended for use in evaluating risk of terrorist attacks on a facility, based upon a proven vulnerability assessment methodology and traditional approach. It describes a three-phase approach, including: 1) focusing policy, procedures, budgeting, research and development, and further assessment activities on those scenarios, which are most likely to be high-risk scenarios; 2) evaluating facilities across an organization in order to prioritize them for detailed facility evaluations; and 3) conducting a detailed facility assessment.
我们描述了一个形式化分析工具系统的概念,该系统旨在用于评估设施遭受恐怖袭击的风险,该系统基于一种经过验证的脆弱性评估方法和传统方法。它描述了一个三阶段的方法,包括:1)将政策、程序、预算、研究和开发以及进一步的评估活动集中在那些最有可能是高风险情景的情景上;2)评估整个组织的设施,以便对其进行详细的设施评估;3)进行详细的设施评估。
{"title":"A risk assessment system for multi-facility organizations","authors":"T.M. Wood, S.G. King, J. Kennon","doi":"10.1109/CCST.2003.1297559","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297559","url":null,"abstract":"We describe a concept for a formalized system of analysis tools intended for use in evaluating risk of terrorist attacks on a facility, based upon a proven vulnerability assessment methodology and traditional approach. It describes a three-phase approach, including: 1) focusing policy, procedures, budgeting, research and development, and further assessment activities on those scenarios, which are most likely to be high-risk scenarios; 2) evaluating facilities across an organization in order to prioritize them for detailed facility evaluations; and 3) conducting a detailed facility assessment.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"392 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124651235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trace copy forgery detection for handwritten signature verification 用于手写签名验证的跟踪副本伪造检测
P. Deng, L. Jaw, Jau-Hwang Wang, C. Tung
Handwritten signature verification has been extensively studied in past decades. Its many applications include banking, credit card validation, security systems etc. We mainly deal with the trace copy forgery detection problem in a handwritten signature verification system. Based on one of our previously study [P. S. Deng et al. (1999)], we have proposed an efficient approach, called Deng's approach to build-up an offline handwritten signature verification system by using wavelet transformation technique. From the experimental results, the accuracy rate of the Deng's approach [P. S. Deng et al. (1999)] is 92.57% and 93.68% for English and Chinese respectively. The approach we proposed not only got a good accuracy result, i.e. 87%, but also has many other advantages as follows: (1) it can be applied in many languages including English and Chinese, (2) it can be adopted to both on-line and off-line applications, and (3) it uses all the strokes information rather than only the vertical strokes information in a Chinese signature.
在过去的几十年里,手写签名的验证得到了广泛的研究。它的许多应用包括银行、信用卡验证、安全系统等。本文主要研究手写签名验证系统中的跟踪副本伪造检测问题。基于我们之前的一项研究[P。S. Deng等人(1999)],我们提出了一种有效的方法,称为Deng的方法,通过小波变换技术建立离线手写签名验证系统。从实验结果来看,邓氏方法的准确率[P。S. Deng et al.(1999)]为92.57%,中文为93.68%。本文提出的方法不仅获得了87%的准确率,而且具有以下优点:(1)可应用于包括英语和汉语在内的多种语言;(2)在线和离线应用均可采用;(3)利用中文签名中的所有笔画信息而不仅仅是竖笔画信息。
{"title":"Trace copy forgery detection for handwritten signature verification","authors":"P. Deng, L. Jaw, Jau-Hwang Wang, C. Tung","doi":"10.1109/CCST.2003.1297602","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297602","url":null,"abstract":"Handwritten signature verification has been extensively studied in past decades. Its many applications include banking, credit card validation, security systems etc. We mainly deal with the trace copy forgery detection problem in a handwritten signature verification system. Based on one of our previously study [P. S. Deng et al. (1999)], we have proposed an efficient approach, called Deng's approach to build-up an offline handwritten signature verification system by using wavelet transformation technique. From the experimental results, the accuracy rate of the Deng's approach [P. S. Deng et al. (1999)] is 92.57% and 93.68% for English and Chinese respectively. The approach we proposed not only got a good accuracy result, i.e. 87%, but also has many other advantages as follows: (1) it can be applied in many languages including English and Chinese, (2) it can be adopted to both on-line and off-line applications, and (3) it uses all the strokes information rather than only the vertical strokes information in a Chinese signature.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116506582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An integrated user authentication and access control scheme without public key cryptography 一种不使用公钥加密的集成用户认证和访问控制方案
H. Chien, J. Jan
Conventionally, user authentication and access control are two separate security mechanisms in many distributed systems. An integrated design of user authentication and access control may provide better performance in terms of security and computational complexity. We discuss the pros and cons of the separate approach and the integrated approach, and then propose a new integrated scheme without using public key cryptography. The new scheme has several practical merits - no user-sensitive data stored on the server, no storage for access list or capability list on the server, extreme low computational cost, the freedom of choosing users' passwords, and mutual authentication.
通常,在许多分布式系统中,用户身份验证和访问控制是两个独立的安全机制。用户认证和访问控制的集成设计可以在安全性和计算复杂度方面提供更好的性能。在此基础上,讨论了独立方案和集成方案的优缺点,提出了一种不使用公钥加密的集成方案。该方案具有以下几个实际优点:服务器上不存储用户敏感数据,服务器上不存储访问列表或功能列表,计算成本极低,可以自由选择用户密码,并且可以相互认证。
{"title":"An integrated user authentication and access control scheme without public key cryptography","authors":"H. Chien, J. Jan","doi":"10.1109/CCST.2003.1297550","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297550","url":null,"abstract":"Conventionally, user authentication and access control are two separate security mechanisms in many distributed systems. An integrated design of user authentication and access control may provide better performance in terms of security and computational complexity. We discuss the pros and cons of the separate approach and the integrated approach, and then propose a new integrated scheme without using public key cryptography. The new scheme has several practical merits - no user-sensitive data stored on the server, no storage for access list or capability list on the server, extreme low computational cost, the freedom of choosing users' passwords, and mutual authentication.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130295920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1