NIST logo

Publications Portal

You searched on:
Topic Area: Networking
Sorted by: title

Displaying records 201 to 210 of 253 records.
Resort by: Date / Title


201. Secure Data Network System (SDNS) Network, Transport, and Message Security Protocols
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 90-4250
Topic: Networking
Published: 2/1/1990
Author: Charles Dinkel
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900555

202. Secure Data Network Systems (SDNS) Access Control Documents
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 90-4259
Topic: Networking
Published: 2/1/1990
Author: Charles Dinkel
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900556

203. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81
Topic: Networking
Published: 1/1/2006
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: [Superseded by SP 800-81 Rev. 1 (April 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113] We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) finger ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150200

204. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81rev1
Topic: Networking
Published: 8/27/2010
Author: Ramaswamy Chandramouli
Abstract: [Superseded by SP 800-81-2 (September 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914217] This document provides deployment guidelines for securing the Domain Name System (DNS) in any enterprise a government agency or a corp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113

205. Security Assurance Levels: A Vector Approach to Describing Security Requirements
Series: OTHER
Topic: Networking
Published: 10/20/2010
Authors: James D Gilsinn, Ragnar Schierholz
Abstract: Safety systems have used the concept of safety integrity levels (SILs) for almost two decades. This allows the safety of a component or system to be represented by a single number that defines a protection factor required to ensure the health and saf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906330

206. Security Considerations for Voice Over IP Systems
Series: Special Publication (NIST SP)
Report Number: 800-58
Topic: Networking
Published: 1/1/2005
Authors: David R Kuhn, Thomas J. Walsh, S G Fries
Abstract: Voice over Internet Protocol (VOIP) refers to the transmission of speech across data-style networks. This form of transmission is conceptually superior to conventional circuit switched communication in many ways. However, a plethora of security issue ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150222

207. Sensor Location through Linear Programming with Arrival Angle Constraints
Topic: Networking
Published: 3/14/2007
Authors: Camillo A Gentile, J Shiu
Abstract: In previous work, we established a linear programming framework to determine sensor location from measured link distances between neighboring nodes in a network. Besides providing greater accuracy compared to other techniques, linear programs in part ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51155

208. Simulating the Time-Scale Dynamics of Network Traffic Using Homogeneous Modeling
Series: Journal of Research (NIST JRES)
Topic: Networking
Published: 6/1/2006
Authors: Kevin L Mills, J Yuan
Abstract: Simulating and understanding traffic dynamics in large networks present difficult challenges due to the complexity of such networks, coupled with limitations inherent in simulation modeling. Typically, simulation models used to study traffic dynamics ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150592

209. Simulation Results for Multiple Interface Management Scenarios, IEEE 802.21-05-0290 San Francisco, CA
Topic: Networking
Published: 7/1/2005
Authors: Nicolas Montavont, Richard Antoine Rouil, Nada T Golmie
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150190

210. Simulation of a Medium Frequency Mesh Network for Communications in Underground Mines
Topic: Networking
Published: 10/3/2010
Authors: Michael R Souryal, Fabien Andre Valoit, Hui Guo, Nader Moayeri, Nicholas W. Damiano, David P. Snyder
Abstract: Signals at the lower end of the medium frequency range (300 kHz to 3000 kHz) propagate with relatively low attenuation along existing metallic infrastructure in an underground mine, such as cables, pipes and rails. Exploiting this capability, low-ban ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905567



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series