NIST logo

Publications Portal

You searched on: Author: david kuhn

Displaying records 71 to 80 of 105 records.
Resort by: Date / Title


71. Security Considerations for Voice Over IP Systems
Series: Special Publication (NIST SP)
Report Number: 800-58
Published: 1/1/2005
Authors: David R Kuhn, Thomas J. Walsh, S G Fries
Abstract: Voice over Internet Protocol (VOIP) refers to the transmission of speech across data-style networks. This form of transmission is conceptually superior to conventional circuit switched communication in many ways. However, a plethora of security issue ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150222

72. Attack vs. Countermeasure Effectiveness (ACE): Modeling Tool for BGP
Published: 11/1/2004
Authors: Kotikalapudi Sriram, Douglas C Montgomery, David R Kuhn
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150194

73. Incorporating Subjective Risk Vales in BGP Attack Trees
Published: 11/1/2004
Authors: David R Kuhn, Kotikalapudi Sriram, Douglas C Montgomery
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50198

74. Securing Voice Over Internet Protocol (IP) Networks
Series: ITL Bulletin
Published: 10/1/2004
Authors: Thomas J. Walsh, David R Kuhn
Abstract: Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibil ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150236

75. Software Fault Complexity and Implications for Software Testing
Published: 6/16/2004
Authors: David R Kuhn, D Wallace, A M Gallo
Abstract: Exhaustive testing of computer software is intractable, but empirical studies of software failures suggest that testing can in some cases be effectively exhaustive. Data reported in this study and others show that software failures in a variety of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151290

76. Vulnerabilities in Quantum Key Distribution Protocols
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6977
Published: 5/1/2003
Author: David R Kuhn
Abstract: Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. The attack could be applied to any protocol that relies on manipulation and return of entang ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50741

77. An Investigation of the Applicability of Design of Experiments to Software Testing
Published: 12/6/2002
Authors: David R Kuhn, Martin L. Mr. Reilly
Abstract: Approaches to software testing based on methods from the field of design of experiments have been advocated as a means of providing high coverage at relatively low cost. Tools to generate all pairs, or higher n-degree combinations, of input values ha ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151271

78. Cost Effective Use of Formal Methods in Verification and Validation Foundations
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli, R W Butler
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expens ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50742

79. Cost Effective Uses of Formal Methods in Verification and Validation
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expensi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151272

80. Security for Telecommuting and Broadband Communications
Series: Special Publication (NIST SP)
Report Number: 800-46
Published: 8/1/2002
Authors: David R Kuhn, Miles C. Tracy, Sheila E Frankel
Abstract: [Superseded by SP 800-46 Rev. 1 (June 2009): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902685] This document introduces broadband communication technologies, and the security considerations associated with them. It discusses the u ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151263



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series