The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On Internet, the sender and receiver can not own the secure communication channel. Eavesdropping can attack the insecure channel to break the process of the signature scheme. Under an unsafe routing path, several attacks from Eve will be happened. In quantum cryptography, these physics properties such as no-cloning theorem, uncertainty principle and quantum teleportation can provide unconditionally...
The OmniTraxreg leaky coaxial cable perimeter intrusion detection system was first introduced at the 2004 International Carnahan Conference (2004). This sensor evolved from the technology of ldquoGUIDARrdquo pioneered in the 1970's to bring intrusion location to perimeter sensors. OmniTrax theory of operation, based on a unique application of new Ultra Wideband Radar was described, as well as its...
The following topics are dealt with: port and airport security; communication security and privacy; computer systems security and privacy; security systems; command and control systems; biometrics; information security; sensor and detection technology; poster session.
Human faces and license plates are the most important targets for many digital surveillance systems. The image quality is too poor to recognize the targets due to the uncontrollable effects such as poor light conditions or far distances from the concerned objects. The cameras are zoomed in to make the targets to be discernible. Image interpolation and super-resolution are two popular techniques for...
In this paper we extend the investigation on the use of Doppler signatures for human motion detection. As it is well known, human movements generate additional Doppler frequencies on top of the main Doppler carrier. In recent times research has been trying to exploit this effect for dynamic feature extraction and, consequently, automatic target recognition. Here a simulation tool is developed and...
In response to the diversification and the rapid evolution of business environment, it is a rising tendency that organization needs to adopt some relevant management systems in order to continuously reinforce its information management mechanisms. Meanwhile, the arrangement for introducing any new management system needs to comply with a series of regulatory procedures and standards. In order to exert...
A need has long existed for a rapid deployment, terrain following security sensor for use around portable resources, along an avenue of approach, or for the temporary replacement of a failed sensor. Existing solutions such as portable microwave or passive infra-red (PIR) sensors are relatively inexpensive, but cannot work over uneven terrain, around corners, or in foliage. The cost and installation...
In this paper, a novel intrusion behavior analysis mechanism based on the design of honey pot and the diagnosis of ant colony algorithm has been proposed. In which, there are monitor module, track module, and analysis module developed. The intrusive behavior is then analyzed through the above modules. In the developed honey pot, all of the architecture, database, directory, security parameters are...
Managing high workload and concurrent accesses are challenging tasks for captive portal. The large number of clients generally creates high workload to the system. Furthermore, some worm or Trojan infected clients create a lot more traffic by spreading themselves through the network via HTTP protocol. Such stateful traffic typically leads to network attack, especially a SYN-Flooding. Additionally,...
The nature of the daily security business at airports (e.g. fast changing regulations) demands more and more flexible training and communication solutions for security officers at airports. Classical classroom training is a proven way for (re-training, but alternative tools, in particular e-solutions, could be taken into account more often to support the classical method of training. In this paper,...
There is increasing interest from regulators and government departments concerned with enhancing security in organisational culture, more specifically the notion of security culture. Recent research conducted by QinetiQ has demonstrated that the security system, however sophisticated the screening technology, can be significantly influenced by the attitudes and behaviour of personnel and the supporting...
Segmentation is one of the most time-consuming steps within the whole process of iris recognition. By means of fuzzy mathematical morphology and neural networks, this new algorithm can fulfill the task of isolating the iris, not only with an acceptable accuracy, but also with a very high improvement in terms of time. Furthermore, this innovative scheme presents an ontology able to decide whether the...
In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be...
Operation of a number of technical systems is related to the danger of events' occurrence posing threat to human health and life, resulting in material damage or damage to the environment. Methods and procedures used for risk management take into consideration also a failure of a human factor as a possible cause of dangerous events' occurrence, but they do not give us opportunity to take into account...
This paper deals with the Signature Data Formats proposed by ISO 19794 project: 19794 part 7 Full Format and Compact Format (published in 2007) and the new 19794 part 11, which is under development. It will be shown how these formats handle the raw data coming from a Signature Input Device, and what the size of a Biometric Information Record is for each one. Another compression method, using LZ77...
Security is one of the key concerns in the domain of information technology systems. Maintaining the confidentiality, integrity and availability of such systems, mandates a rigorous prior analysis of the security risks that confront these systems. In order to analyze, mitigate and recover from these risks a metrics based approach is essential in prioritizing the response strategies against these risks...
In this paper, it is proposed a facial biometric identification system, using discriminative common vector. This method reduces the number of characteristics of the different images from the database and selects the most discriminative of them. In this work, transformed domains, such as discrete cosine transformed (DCT), discrete wavelets transformed (DWT), principal component analysis (PCA), linear...
Directory services are corporate computing objects responsible for providing information about user accounts, computer accounts, contacts, etc. Virtual directories are powerful tools for consolidating this data, modifying it if necessary, and presenting it to the end user in a highly customized manner. While attacks against directory services have been identified, attacks and vulnerabilities of virtual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.