Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1151 - 1175 of 1431

An Overview and Analysis of PDA Forensic Tools

April 2, 2005
Author(s)
Wayne Jansen, Richard Ayers
Mobile handheld devices are becoming evermore affordable and commonplace in society. When they are involved in a security incident or crime, forensic specialists require tools that allow proper extraction and speedy examination of any digital evidence

Performance Analysis of Exponential Backoff

April 1, 2005
Author(s)
B J. Kwak, N O. Song, Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Real-time Applications for Sensor Networks

April 1, 2005
Author(s)
Hamid Gharavi
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Characterizing the Risks and Costs of BGP Insecurity/Security

March 1, 2005
Author(s)
Douglas Montgomery, Kotikalapudi Sriram, Oliver Borchert, Okhee Kim, D. Richard Kuhn
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

Personal Identity Verification (PIV) of Federal Employees and Contractors

February 1, 2005
Author(s)
William C. Barker, James F. Dray Jr., Ramaswamy Chandramouli, Teresa T. Schwarzhoff, William T. Polk, Donna F. Dodson, Ketan L. Mehta, S Gupta, William E. Burr, Timothy Grance
[Superseded by FIPS 201-1 (March 2006): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50836] FIPS 201 specifies the technical and operational requirements for interoperable PIV systems that issue smart cards as identification credentials and

Integrating IT Security into the Capital Planning and Investment Control Process

January 1, 2005
Author(s)
Joan Hash, N Bartol, H Rollins, W Robinson, J Abeles, S Batdorff
Traditionally, information technology (IT) security and capital planning and investment control (CPIC) processes have been performed independently by security and capital planning practitioners. However, the Federal Information Security Management Act

Ad-hoc Network Systems and Applications

November 1, 2004
Author(s)
Hamid Gharavi
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Optical Control and Management Security Standards for the GIG-BE

October 31, 2004
Author(s)
Renee Esposito, Sheila E. Frankel, Richard Graveman, Scott McNown
This paper presents an overview of requirements and standards development activities for securing the control and management infrastructure protocols for optical networking protocols used in the Global Information Grid-Bandwidth Expansion (GIG-BE). Our

Guide to Public Safety Applications of Wireless Technology

October 1, 2004
Author(s)
Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Securely Connecting the World with Cyber Security Standards

October 1, 2004
Author(s)
Alicia Clay Jones, Michael Hogan
This paper focuses on some of the key roles that cyber security standards play in securely connecting our cyber world. Cyber security standards can be categorized as technical, management, or testing standards. All three types of standards are necessary to

Securing Voice Over Internet Protocol (IP) Networks

October 1, 2004
Author(s)
Thomas J. Walsh, David R. Kuhn
Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibility are

3rd Annual PKI R&D Workshop Proceedings

September 8, 2004
Author(s)
K I. Sankar, William Polk, Nelson Hastings
NIST hosted the third annual Public Key Infrastructure (PKI) Research Workshop on April 12-14, 2004. The two and a half day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public

Information Security in the System Development Life Cycle

September 1, 2004
Author(s)
Annabelle Lee, Tanya L. Brewer
Many system development life cycle (SDLC) models exist that can be used by an organization to effectively develop an information system. Security should be incorporated into all phases, from initiation to disposition, of an SDLC model. This Bulletin lays

Electronic Authentication: Guidance for Selecting Secure Techniques

August 1, 2004
Author(s)
Shirley M. Radack
This ITL Bulletin summarizes the contents of NIST Special Publication 800-63, Electronic Authentication Guideline, by William E. Burr, Donna F. Dodson, and W. Timothy Polk, which provides technical guidance on existing and widely implemented methods for
Displaying 1151 - 1175 of 1431