NIST logo

Publications Portal

You searched on:
Author: david kuhn

Displaying records 61 to 70 of 96 records.
Resort by: Date / Title


61. Autonomous System (AS) Isolation under Randomized BGP Session Attacks with RFD Exploitation
Published: 4/1/2006
Authors: Kotikalapudi Sriram, Douglas C Montgomery, Oliver Borchert, Okhee Kim, David R Kuhn
Abstract: BGP peering session attacks are known to drive routes into route flap damping (RFD) suppression states and thus cause isolations between autonomous systems (ASes) and destinations. We present a detailed study of the impact of BGP peering session att ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150120

62. Securing Voice Over IP Networks
Published: 5/27/2005
Authors: T J Walsh, David R Kuhn
Abstract: Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibil ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150237

63. Characterizing the Risks and Costs of BGP Insecurity/Security
Published: 3/1/2005
Authors: Douglas C Montgomery, Kotikalapudi Sriram, Oliver Borchert, Okhee Kim, David R Kuhn
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150197

64. Security Considerations for Voice Over IP Systems
Series: Special Publication (NIST SP)
Report Number: 800-58
Published: 1/1/2005
Authors: David R Kuhn, Thomas J. Walsh, S G Fries
Abstract: Voice over Internet Protocol (VOIP) refers to the transmission of speech across data-style networks. This form of transmission is conceptually superior to conventional circuit switched communication in many ways. However, a plethora of security issue ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150222

65. Attack vs. Countermeasure Effectiveness (ACE): Modeling Tool for BGP
Published: 11/1/2004
Authors: Kotikalapudi Sriram, Douglas C Montgomery, David R Kuhn
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150194

66. Incorporating Subjective Risk Vales in BGP Attack Trees
Published: 11/1/2004
Authors: David R Kuhn, Kotikalapudi Sriram, Douglas C Montgomery
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50198

67. Securing Voice Over Internet Protocol (IP) Networks
Series: ITL Bulletin
Published: 10/1/2004
Authors: Thomas J. Walsh, David R Kuhn
Abstract: Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibil ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150236

68. Software Fault Complexity and Implications for Software Testing
Published: 6/16/2004
Authors: David R Kuhn, D Wallace, A M Gallo
Abstract: Exhaustive testing of computer software is intractable, but empirical studies of software failures suggest that testing can in some cases be effectively exhaustive. Data reported in this study and others show that software failures in a variety of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151290

69. Vulnerabilities in Quantum Key Distribution Protocols
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6977
Published: 5/1/2003
Author: David R Kuhn
Abstract: Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. The attack could be applied to any protocol that relies on manipulation and return of entang ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50741

70. An Investigation of the Applicability of Design of Experiments to Software Testing
Published: 12/9/2002
Authors: David R Kuhn, Martin L. Reilly
Abstract: Methods from the field of design of experiments (DOE) have been applied to quality control problems in many engineering fields for several decades. DOE seeks to maximize the amount of information gained in an experiment by optimizing the combination ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151271



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series