Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1076 - 1100 of 1431

Power Control in Multihop CSMA

June 1, 2006
Author(s)
Hamid Gharavi, Bo Yan
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Protecting Sensitive Information Transmitted in Public Networks

April 21, 2006
Author(s)
Shirley M. Radack
This bulletin summarizes NIST SP 800-77, Guide to IPsec VPNs, which was issued by NIST to help network architects, network administrators, security staff, technical support staff, and computer security program managers who are responsible for the technical

Cryptographic Hash Standards ? Where Do We Go From Here?

April 1, 2006
Author(s)
William E. Burr
The two most commonly used cryptographic hash functions, MD5 and SHA-1, have been successfully attacked?it is no longer advisable to use them in some applications, although other applications are not affected. Furthermore, these attacks have triggered a

Prevailing Over Wires in Healthcare Environments: Benefits and Challenges

April 1, 2006
Author(s)
David E. Cypher, Nicolas Chevrollier, Nicolas Montavont, Nada T. Golmie
The objectives of this article are to survey the benefits and challenges that poise the deployment and operation of wireless communications in support of healthcare networks. While the main advantages of wireless communications remain to provide ubiquitous

Collisions and Near-Collisions for Reduced-Round Tiger

March 1, 2006
Author(s)
John M. Kelsey, Stefan Lucks
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression function invocations. This extends to a collision-finding attack on 17 rounds of the Tiger hash function in time of about 249

Minimum Security Requirements for Federal Information and Information Systems

March 1, 2006
Author(s)
Ronald S. Ross, Stuart W. Katzke, L A. Johnson
FIPS 200 is the second standard that was specified by the Federal Information Security Management Act (FISMA). It is an integral part of the risk management framework that the National Institute of Standards and Technology (NIST) has developed to assist

Guide for Developing Security Plans for Information Technology Systems

February 24, 2006
Author(s)
Marianne M. Swanson, Joan Hash, Pauline Bowen
The objective of system security planning is to improve protection of information system resources. All federal systems have some level of sensitivity and require protection as part of good management practice. The protection of a system must be documented

Biometrics Standards ? Rising to the Challenge of Technology Innovation

February 1, 2006
Author(s)
Fernando L. Podio
For decades, biometric technologies were primarily used in law enforcement applications. Currently, they are increasingly being required in multiple public and private sector applications worldwide to authenticate a person?s identity, secure national

Computer Security Division 2005 Annual Report

February 1, 2006
Author(s)
Tanya L. Brewer, Matthew A. Scholl
This report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during the Fiscal Year 2005. It discusses all projects and programs within the Division, staff highlights, and publications. For
Displaying 1076 - 1100 of 1431