Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1101 - 1125 of 1431

Personal Identity Verification Card Management Report

January 6, 2006
Author(s)
James F. Dray Jr., David Corcoran
NIST Special Publication 800-73 (http://piv.nist.gov) provides technical specifications for Personal Identity Verification (PIV) cards. However, it does not contain a complete card management specification for PIV systems. This Report provides an overview

Cryptographic Primitives Can Be Fragile

January 3, 2006
Author(s)
Rene C. Peralta
We show that a well-known coin-flipping protocol is breakable in the sense that one of the parties can pre-determine the result of the coin-flip. The way in which the protocol fails is illustrative of the fact that there are insecure ways of using secure

Application of Beamforming in Wireless Location Estimation

January 1, 2006
Author(s)
Kamran Sayrafian, D Kaspar
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Source-Assisted Direction Estimation Inside Buildings

January 1, 2006
Author(s)
Kamran Sayrafian, D Kaspar
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

E-Government Security Issues and Measures

December 30, 2005
Author(s)
William C. Barker
The Handbook will be a three-volume, 2,400-page reference source providing state-of-the-art information concerning the information, computer and network security with coverage of the core topics. The audience is four-year colleges and universities with

HL7 Experimental Registry

December 12, 2005
Author(s)
William J. Majurski, A Mccaffrey, Mary T. Laamanen
Our results extending Kuhn's fault class hierarchy provide a justification for the focus of fault-based testing strategies on detecting particular faults and ignoring others. We develop a novel analytical technique that allows us to elegantly prove that

Guide to IPsec VPNs: Recommendations of the National Institute of Standards and Technology

December 1, 2005
Author(s)
Sheila E. Frankel, Karen Kent, Ryan Lewkowski, Angela Orebaugh, Ronald Ritchey, Steven Sharma
IPsec is a framework of open standards for ensuring private communications over public networks. It has become the most common network layer security control, typically used to create a virtual private network (VPN). A VPN is a virtual network ,built on

DTR-MESA-SYS0070012: System Reference Architecture

October 1, 2005
Author(s)
L T. Klein-berdnt
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Dymo Implementation

October 1, 2005
Author(s)
L T. Klein-berdnt
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Handover and Interference Mitigation in Healthcare Environments

October 1, 2005
Author(s)
Nicolas Chevrollier, Nicolas Montavont, Nada T. Golmie
In this article, we consider candidate wireless technologies such as IEEE 802.11b, and IEEE 802.15.4 that can support medical and healthcare informatics applications. The main questions that we try to answer are: (1) is there any potential for significant

Indoor Navigation for First Responders

October 1, 2005
Author(s)
L T. Klein-berndt, Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
Displaying 1101 - 1125 of 1431