Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1126 - 1150 of 1431

Indoor Positioning Using Spatial Power Spectrum

October 1, 2005
Author(s)
Kamran Sayrafian, D Kaspar
A simple technique to estimate the position of a given mobile source inside a building is based on the received signal strength. For this methodology to have a reasonable accuracy, radio visibility of the mobile by at least three access points is required

Link Variability Studies

October 1, 2005
Author(s)
L T. Klein-berndt, Michael R. Souryal, Leonard E. Miller, Nader Moayeri
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Public Safety Wireless Technology Links

October 1, 2005
Author(s)
Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

RFID-Assisted Localization and Communications for First Responders

October 1, 2005
Author(s)
Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Indoor Positioning Using Spatial Spectrum

September 7, 2005
Author(s)
Kamran Sayrafian
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Analysis of EIED Backoff Algorithm for the 802.11 DCF

September 1, 2005
Author(s)
N-O Song, B-J Kwak, Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

4th Annual PKI R&D Workshop "Multiple Paths to Trust" Proceedings

August 1, 2005
Author(s)
Clifford Neuman, William Polk, Nelson Hastings
NIST hosted the fourth annual Public Key Infrastructure (PKI) Research Workshop on April 19-21, 2005. The two and a half day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public

Computer Security Division 2004 Annual Report

August 1, 2005
Author(s)
Tanya L. Brewer
This report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2004. It discusses all projects and programs within the Division, staff highlights, and publications. For many

mLab: A Mobile Ad Hoc Network Test Bed

July 14, 2005
Author(s)
Tom T. Karygiannis, Emmanouil Antonakakis
Over the last few years, research in the area of mobile ad hoc networks (MANETs) has focused on routing protocol performance improvements, security enhancements, power consumption optimizations, and quality of service metrics. The availability of

Application of Beamforming in Wireless Location Estimation

July 1, 2005
Author(s)
Kamran Sayrafian
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Evaluation of Indoor Localization Techniques

July 1, 2005
Author(s)
Camillo Gentile, Kamran Sayrafian, Nader Moayeri
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Smart Cards and Mobile Device Authentication: an Overview and Implementation

July 1, 2005
Author(s)
Wayne Jansen, Serban I. Gavrila, Clement Seveillac, Vladimir Korolev
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for

NIST's Security Configuration Checklists Program for Technology Products

June 1, 2005
Author(s)
Shirley M. Radack
This bulletin describes the NIST security configuration checklists program and is based on NIST Special Publication 800-70: Security Configuration Checklists Program for IT Products, by Murugiah Souppaya, John Wack and Karen Kent. The bulletin discusses

On the Use of Wireless Network Technologies in Healthcare Environments

June 1, 2005
Author(s)
Nicolas Chevrollier, Nada T. Golmie
In this article, we investigate the suitability of wireless technologies in healthcare/hospital environments. We focus on Wireless Personal Area Network technologies, namely, Bluetooth and the low-rate specifications described in the IEEE 802.15.4 standard

Proximity Beacons and Mobile Device Authentication: an Overview and Implementation

June 1, 2005
Author(s)
Wayne Jansen, Serban I. Gavrila, Vladimir Korolev
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for

RFID 101

June 1, 2005
Author(s)
Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Second Primages on n-bit Hash Functions for Much Less than 2n Work

May 1, 2005
Author(s)
John M. Kelsey, B Schneier
We expand a previous result of Dean[Dea99] to provide a second preimage attack on all n-bit iterated hash functions with Damgard-Merkle strengthening and n-bit intermediate states, allowing a second preimage to be found for a 2k-message-block message with
Displaying 1126 - 1150 of 1431