Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297607
Lih-Chyau Wuu, Chi-Hsiang Hung, Sout-Fong Chen
We propose a framework for Snort network-based intrusion detection system to make it have the ability of not only catching new attack patterns automatically, but also detecting sequential attack behaviors. To do that, we first build an intrusion pattern discovery module to find single intrusion patterns and sequential intrusion patterns from a collection of attack packets in offline training phase. The module applies data mining technique to extract descriptive attack signatures from large stores of packets, and then it converts the signatures to Snort detection rules for online detection. In order to detect sequential intrusion behavior, the Snort detection engine is accompanied with our intrusion behavior detection engine. When a series of incoming packets match the signatures representing sequential intrusion scenarios, intrusion behavior detection engine make an alert.
{"title":"Building intrusion pattern miner for snort network intrusion detection system","authors":"Lih-Chyau Wuu, Chi-Hsiang Hung, Sout-Fong Chen","doi":"10.1109/CCST.2003.1297607","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297607","url":null,"abstract":"We propose a framework for Snort network-based intrusion detection system to make it have the ability of not only catching new attack patterns automatically, but also detecting sequential attack behaviors. To do that, we first build an intrusion pattern discovery module to find single intrusion patterns and sequential intrusion patterns from a collection of attack packets in offline training phase. The module applies data mining technique to extract descriptive attack signatures from large stores of packets, and then it converts the signatures to Snort detection rules for online detection. In order to detect sequential intrusion behavior, the Snort detection engine is accompanied with our intrusion behavior detection engine. When a series of incoming packets match the signatures representing sequential intrusion scenarios, intrusion behavior detection engine make an alert.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114605625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297598
Dwen-Ren Tsai, Wen-Pin Tai, Chi-Fang Chang
We propose a hybrid intelligent intrusion detection system to recognize novel attacks. Current works in intrusion detection solve the anomaly detection and the misuse detection. The misuse detection cannot recognize the new types of intrusions; while the abnormal detection also suffers from the false alarms. The mechanism to detect new forms of attacks in the systems will be the most important issue for intrusion detection For this purpose, we apply the neural network approach to learn the attack definitions and the fuzzy inference approach to describe the relations of attack properties for recognition This study concentrates the focus on detecting distributed denial of service attacks to develop this system. Experiment results will verify the performance of the model.
{"title":"A hybrid intelligent intrusion detection system to recognize novel attacks","authors":"Dwen-Ren Tsai, Wen-Pin Tai, Chi-Fang Chang","doi":"10.1109/CCST.2003.1297598","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297598","url":null,"abstract":"We propose a hybrid intelligent intrusion detection system to recognize novel attacks. Current works in intrusion detection solve the anomaly detection and the misuse detection. The misuse detection cannot recognize the new types of intrusions; while the abnormal detection also suffers from the false alarms. The mechanism to detect new forms of attacks in the systems will be the most important issue for intrusion detection For this purpose, we apply the neural network approach to learn the attack definitions and the fuzzy inference approach to describe the relations of attack properties for recognition This study concentrates the focus on detecting distributed denial of service attacks to develop this system. Experiment results will verify the performance of the model.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123303186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297605
Yuh-Ren Tsai, Cheng-Ju Chang
Authentication and roaming are critical issues for wireless data applications. Due to the strong points of mobile cellular network - large subscriber base, secure authentication mechanism, well established roaming agreements and well defined service entries, - it is favorable to integrate the authentication mechanism of WLAN into that of mobile cellular network. For GSM/GPRS cellular systems, the subscriber identity module (SIM) card is used for user identification, authentication and message encryption. Thus, it is feasible to authenticate the subscribers in WLAN via exchanging the authentication information between mobile cellular network and subscribers' SIM cards. The issue of SIM-based subscriber authentication for WLAN is investigated. By utilizing the GSM authentication information, an authentication mechanism is proposed and an experimental system is implemented.
{"title":"SIM-based subscriber authentication for wireless local area networks","authors":"Yuh-Ren Tsai, Cheng-Ju Chang","doi":"10.1109/CCST.2003.1297605","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297605","url":null,"abstract":"Authentication and roaming are critical issues for wireless data applications. Due to the strong points of mobile cellular network - large subscriber base, secure authentication mechanism, well established roaming agreements and well defined service entries, - it is favorable to integrate the authentication mechanism of WLAN into that of mobile cellular network. For GSM/GPRS cellular systems, the subscriber identity module (SIM) card is used for user identification, authentication and message encryption. Thus, it is feasible to authenticate the subscribers in WLAN via exchanging the authentication information between mobile cellular network and subscribers' SIM cards. The issue of SIM-based subscriber authentication for WLAN is investigated. By utilizing the GSM authentication information, an authentication mechanism is proposed and an experimental system is implemented.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117082879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297610
Jain-Shing Wu
The explosive growth in Internet connectivity and e-service has resulted in unprecedented demands for security technologies. Host and network security are getting more critical and more complex due to the diversified and evolved ways of attack form anyplace in Internet world. Most of the technologies been developed are focusing on protecting individual systems and limited scope of network by using different diagnosis and detection approaches. Both commercial and noncommercial solutions, called IDS (intrusion detection system), usually maintain their own proprietary databases by collecting detection patterns. In general, more patterns collected and more up-to-date of the databases surely increase the capabilities of their bundled IDS solutions. However, due to the coverage limitation and late awareness, there still have new growing uncovered breaches that single IDS would not be able to catch up. The reasons are two: 1) Any one proprietary IDS is incapable of collecting so many detection patterns daily brought up in Internet world. 2) Systems under certain proprietary IDS's protection are unable to get instant notification of new detection patterns, most of which are discovered by other IDSs. In order to reduce the risks of coverage limitation and time delay of new types of attack, a joint defense service framework is been proposed, which work as human nervous system to protect every nodes within the system at all.
{"title":"The neuron security of joint defense for network intrusion detection","authors":"Jain-Shing Wu","doi":"10.1109/CCST.2003.1297610","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297610","url":null,"abstract":"The explosive growth in Internet connectivity and e-service has resulted in unprecedented demands for security technologies. Host and network security are getting more critical and more complex due to the diversified and evolved ways of attack form anyplace in Internet world. Most of the technologies been developed are focusing on protecting individual systems and limited scope of network by using different diagnosis and detection approaches. Both commercial and noncommercial solutions, called IDS (intrusion detection system), usually maintain their own proprietary databases by collecting detection patterns. In general, more patterns collected and more up-to-date of the databases surely increase the capabilities of their bundled IDS solutions. However, due to the coverage limitation and late awareness, there still have new growing uncovered breaches that single IDS would not be able to catch up. The reasons are two: 1) Any one proprietary IDS is incapable of collecting so many detection patterns daily brought up in Internet world. 2) Systems under certain proprietary IDS's protection are unable to get instant notification of new detection patterns, most of which are discovered by other IDSs. In order to reduce the risks of coverage limitation and time delay of new types of attack, a joint defense service framework is been proposed, which work as human nervous system to protect every nodes within the system at all.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297528
C. Smith
The defence in depth strategy is a fundamental principle in the physical protection of the assets of an organisation. The robustness of the strategy has allowed it to be applied to a range of situations where assets need to be protected. This study seeks to examine the understanding of novice learners' perceptions of the defence in depth principles through the knowledge structure approach to concepts in the strategy. The multidimensional scaling (MDS) statistical technique has been applied to dissimilarity measures on a range of facilities according to the defence in depth functions of deterrence, detection, delay, and response. The barriers that correspond to these functions are considered as the analysis standard for the set of facilities. Pre- and post-instruction knowledge structures for the defence in depth functions of deterrence, detection, delay and response have been produced for novice learners. The knowledge structures for these same functions were produced for an expert group in understanding defence in depth. A comparison of knowledge structures for novice learners and the expert group indicates that novice learners knowledge structures become more like the experts structures with instruction.
{"title":"Understanding concepts in the defence in depth strategy","authors":"C. Smith","doi":"10.1109/CCST.2003.1297528","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297528","url":null,"abstract":"The defence in depth strategy is a fundamental principle in the physical protection of the assets of an organisation. The robustness of the strategy has allowed it to be applied to a range of situations where assets need to be protected. This study seeks to examine the understanding of novice learners' perceptions of the defence in depth principles through the knowledge structure approach to concepts in the strategy. The multidimensional scaling (MDS) statistical technique has been applied to dissimilarity measures on a range of facilities according to the defence in depth functions of deterrence, detection, delay, and response. The barriers that correspond to these functions are considered as the analysis standard for the set of facilities. Pre- and post-instruction knowledge structures for the defence in depth functions of deterrence, detection, delay and response have been produced for novice learners. The knowledge structures for these same functions were produced for an expert group in understanding defence in depth. A comparison of knowledge structures for novice learners and the expert group indicates that novice learners knowledge structures become more like the experts structures with instruction.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297560
Thou-Ho Chen
Based on color image processing, an automatic bidirectional counting method of pedestrians through a gate is proposed. In the developed technique, one color video camera is hung from the ceiling of the gate with a directly downward view so that the passing people will be observed from just overhead. Firstly, the passing people is roughly counted with the area of people in an image. The moving direction of the pedestrian can be oriented by tracking each people pattern through analyzing its HSI histogram. With features extracted from the quantized histograms of I (intensity) or H (hue), the first counting can be refined. Experimental results show that an 100% accuracy of bidirectional counting can be achieved in the case of multiple isolated one-person patterns and the same accuracy can be also obtained unless the people number of a multiple-person pattern is over five.
{"title":"An automatic bi-directional passing-people counting method based on color image processing","authors":"Thou-Ho Chen","doi":"10.1109/CCST.2003.1297560","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297560","url":null,"abstract":"Based on color image processing, an automatic bidirectional counting method of pedestrians through a gate is proposed. In the developed technique, one color video camera is hung from the ceiling of the gate with a directly downward view so that the passing people will be observed from just overhead. Firstly, the passing people is roughly counted with the area of people in an image. The moving direction of the pedestrian can be oriented by tracking each people pattern through analyzing its HSI histogram. With features extracted from the quantized histograms of I (intensity) or H (hue), the first counting can be refined. Experimental results show that an 100% accuracy of bidirectional counting can be achieved in the case of multiple isolated one-person patterns and the same accuracy can be also obtained unless the people number of a multiple-person pattern is over five.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133868886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297596
Cabin Ying, A. Tsai, H. Yu
Institute for Information Industry is currently handling a project for National Information and Communication Security Taskforce of Executive Yuan. One of the missions of this project is to conduct information security assessments for the current security situation of the national network. Although there are already many commercial software packages on the market to help diagnose security vulnerabilities, but most of these software packages are aiming for small to medium size organizations and only for one single enterprise infrastructure. Therefore, they are not able to perform an over-organization, integrated vulnerability assessment analysis. Moreover, the vulnerability assessment is only the beginning step of solving information security problems; there is a need for a comprehensive management mechanism for information security vulnerability assessment, to let IT staff precisely resolve the security problems of the information systems. As the result, the design goal of VAS is to provide assistance to perform a comprehensive management mechanism for information security vulnerability assessment.
{"title":"Vulnerability assessment system (VAS)","authors":"Cabin Ying, A. Tsai, H. Yu","doi":"10.1109/CCST.2003.1297596","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297596","url":null,"abstract":"Institute for Information Industry is currently handling a project for National Information and Communication Security Taskforce of Executive Yuan. One of the missions of this project is to conduct information security assessments for the current security situation of the national network. Although there are already many commercial software packages on the market to help diagnose security vulnerabilities, but most of these software packages are aiming for small to medium size organizations and only for one single enterprise infrastructure. Therefore, they are not able to perform an over-organization, integrated vulnerability assessment analysis. Moreover, the vulnerability assessment is only the beginning step of solving information security problems; there is a need for a comprehensive management mechanism for information security vulnerability assessment, to let IT staff precisely resolve the security problems of the information systems. As the result, the design goal of VAS is to provide assistance to perform a comprehensive management mechanism for information security vulnerability assessment.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131376822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the wake of the fast popularization of information and the rise of electronic commerce, information security is gaining much attention. How to perform the evaluation of the value of assets, how to perform the analysis of the risks associated with assets, and how to protect information assets from sabotage, theft and tamper are important topics in the study of the management of information security. We address the aspects of confidentiality, integrity and availability of information and apply the Analytic Hierarchy Process (AHP) to consolidate expert's opinions on information risks, in order to construct an integrated framework for risk analysis. The BS7799 standard and the risk level matrix (RLM) are used accordingly to evaluate the effectiveness of and to categorize the risk management measures and to create a complete model for the assessment of information assets related risks. Finally, the research results are verified by a case study. The results can be used by organizations as references for information security planning and management process improvements.
{"title":"Evaluation of information security related risks of an organization: the application of the multicriteria decision-making method","authors":"Bao-Chyuan Guan, Chi-Chun Lo, Ping Wang, Jaw-Shi Hwang","doi":"10.1109/CCST.2003.1297555","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297555","url":null,"abstract":"In the wake of the fast popularization of information and the rise of electronic commerce, information security is gaining much attention. How to perform the evaluation of the value of assets, how to perform the analysis of the risks associated with assets, and how to protect information assets from sabotage, theft and tamper are important topics in the study of the management of information security. We address the aspects of confidentiality, integrity and availability of information and apply the Analytic Hierarchy Process (AHP) to consolidate expert's opinions on information risks, in order to construct an integrated framework for risk analysis. The BS7799 standard and the risk level matrix (RLM) are used accordingly to evaluate the effectiveness of and to categorize the risk management measures and to create a complete model for the assessment of information assets related risks. Finally, the research results are verified by a case study. The results can be used by organizations as references for information security planning and management process improvements.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121375012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297625
P. Deng, Wen-Gong Shieh, Jau-Hwang Wang, C. Tung, Chih-Pin Yen
To solve the drawbacks mentioned by Cohen [2001] and many other researchers in the software self-defense method, we propose a new improved method in this research to construct a robust immune program code I and make it almost impossible to be removed from the protected program IP. The main idea to achieve this is that we can masquerade I from being detected and removed by virus by using polymorphism techniques that are traditionally used by virus writers. Besides polymorphism, encryption, multiple compressions and mutation, we also apply other techniques to masquerade immune program code I. And let immune program code I become more than millions of different code patterns with the same function. More, we also propose a scheme to solve the generic attack of software self defense. Based on our experimental result, the software self-defense technique is really improved by our proposed method and work well in the real world.
{"title":"A robust method for software self-defense","authors":"P. Deng, Wen-Gong Shieh, Jau-Hwang Wang, C. Tung, Chih-Pin Yen","doi":"10.1109/CCST.2003.1297625","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297625","url":null,"abstract":"To solve the drawbacks mentioned by Cohen [2001] and many other researchers in the software self-defense method, we propose a new improved method in this research to construct a robust immune program code I and make it almost impossible to be removed from the protected program IP. The main idea to achieve this is that we can masquerade I from being detected and removed by virus by using polymorphism techniques that are traditionally used by virus writers. Besides polymorphism, encryption, multiple compressions and mutation, we also apply other techniques to masquerade immune program code I. And let immune program code I become more than millions of different code patterns with the same function. More, we also propose a scheme to solve the generic attack of software self defense. Based on our experimental result, the software self-defense technique is really improved by our proposed method and work well in the real world.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123631691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-10-14DOI: 10.1109/CCST.2003.1297584
Bin-Tsan Hsieh, Her-Tyan Yeh, Hung-Min Sun
A remote user authentication scheme is a procedure for a server to authenticate a remote user in a network. Recently, Lee et al. proposed a fingerprint-based remote user authentication scheme to overcome the security flaw in Hwang and Li's scheme. In Lee et al.'s authentication scheme, they store two secret keys and some public elements in a smart card. We first review Lee et al.'s fingerprint-based user authentication scheme. Next, we show that Lee et al.'s scheme still suffers from the impersonation attack.
{"title":"Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards","authors":"Bin-Tsan Hsieh, Her-Tyan Yeh, Hung-Min Sun","doi":"10.1109/CCST.2003.1297584","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297584","url":null,"abstract":"A remote user authentication scheme is a procedure for a server to authenticate a remote user in a network. Recently, Lee et al. proposed a fingerprint-based remote user authentication scheme to overcome the security flaw in Hwang and Li's scheme. In Lee et al.'s authentication scheme, they store two secret keys and some public elements in a smart card. We first review Lee et al.'s fingerprint-based user authentication scheme. Next, we show that Lee et al.'s scheme still suffers from the impersonation attack.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124870055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}