An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Stephen Quirolgico, Chung Tong Hu, Tom T. Karygiannis
The Access Control for SAR Systems (ACSS) project focused on developing a prototype privilege management system used to express and enforce policies for...
Fernando L. Podio, Dylan J. Yaga, Christofer J. McGinnis
The Computer Security Division of NIST/ITL supports the development of biometric conformance testing methodology standards and other conformity assessment...
Asset identification plays an important role in an organization‟s ability to quickly correlate different sets of information about assets. This specification...
This paper presents a simple model to demonstrate the effect on grass-fire propagation of the winds induced by structural fires in a Wildland-Urban Interface...
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It...
Shahram Orandi, John M. Libert, John Grantham, Kenneth Ko, Stephen S. Wood, Jin Chu Wu
This paper presents the findings of a study conducted to measure the impact of JPEG 2000 compression on fingerprint imagery at various levels of compression...
Yooyoung Lee, Ross J. Micheals, James J. Filliben, P J. Phillips
Due to its distinctiveness, the human iris is a popular biometric feature used to identity a person with high accuracy. The Grand Challenge in iris...
Mahesh Mani, Kevin W. Lyons, Alexander P. Muroyama, Bjorn J. Johansson
Sustainability has become a ubiquitous term in almost every field, especially in engineering design and manufacturing. Recently, an increased awareness of...
Antoine Fillinger, Lukas Diduch, Imad Hamchi, Vincent M. Stanford
The need for very large fingerprint benchmarks to test the efficacy of emerging commercial technologies for fingerprint minutia detection, matching, compression...
Disassembly process is an essential activity in the mid and end of a products service life cycle. Maintenance is a mid product life activity, which involves...
This report defines version 2.0 of the Open Checklist Interactive Language (OCIL). The intent of OCIL is to provide a standardized basis for expressing...
Michael C. Gibbons, Svetlana Z. Lowry, Matthew T. Quinn
HITECH Act's provisions to drive adoption and meaningful use of Electronic Health Records (EHRs) holds great promise in supporting improvements in the quality...
Patrick J. Grother, Wayne J. Salamon, Craig I. Watson, Michael D. Indovina, Patricia A. Flanagan
The MINEX II trials have been conducted to evaluate the accuracy and speed of MATCH-ON-CARD verification algorithms. These run on ISO/IEC 7816 smartcards. They...
Michael D. Indovina, R. A. Hicklin, G I. Kiebuzinski
ELFT-EFS Evaluation 1 is an evaluation of the accuracy of latent matching using features marked by experienced human latent fingerprint examiners. The purpose...
Ram D. Sriram, Conrad E. Bock, Fabian M. Neuhaus, Evan K. Wallace, Mary C. Brady, Mark Musen, Joanne Luciano
The National Institute for Standards and Technology sponsored a workshop in October, 2007, on the subject of ontology evaluation. An international group of...
J. R. Beveridge, P. Jonathon Phillips, Geof H. Givens, Bruce A. Draper, Mohammad N. Teli, David Bolme
In face recognition, quality is typically thought of as a property of individual images, not image pairs. The implicit assumption is that high-quality images...
Alice J. O'Toole, P. Jonathon Phillips, Xiaobo An, Joseph Dunlop
The intended applications of automatic face recognition systems include venues that vary widely in demographic diversity. Formal evaluations of algorithms do...
P J. Phillips, J. R. Beveridge, Bruce A. Draper, Geof H. Givens, Alice J. O'Toole, David Bolme, Joseph Dunlop, Yui M. Lui, Hassan A. Sahibzada, Samuel Weimer
The Good, the Bad, & the Ugly Face Challenge Problem was created to encourage the development of algorithms that are robust to recognition across changes in...
Sarah E. Baker, Patrick J. Flynn, Kevin W. Bowyer, P. Jonathon Phillips
We present results of the first systematic study to investigate the degree to which template aging occurs for iris biometrics. Our experiments use an image data...
This report recommends best practices for development and deployment of modeling, simulation and analysis (MS&A) tools for homeland security applications. The...
In video communications the compressed video stream is very likely to be corrupted by channel errors. In order to combat these channel errors, many methods have...
The success of biometric applications is particularly dependent on the interoperability of biometric systems. Deploying these systems requires a comprehensive...
Meltem Sonmez Turan, Ray A. Perlner, Lawrence E. Bassham, William E. Burr, Dong H. Chang, Shu-jen H. Chang, Morris J. Dworkin, John M. Kelsey, Souradyuti Paul, Rene C. Peralta
The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3...
Nelson Hastings, Rene Peralta, Stefan Popoveniuc, Andrew Regenscheid
This whitepaper for the Technical Guidelines Development Committee (TGDC) identifies desirable security properties of remote electronic voting systems...
This glossary of key information security terms has been extracted from NIST Federal Information Processing Standards (FIPS), Special Publication (SP) 800...
Diane Mauchant, Michael A. Riley, Kirk D. Rice, Amanda L. Forster, Dennis D. Leber, Daniel V. Samarov
The performance standard for ballistic-resistant body armor published by the National Institute of Justice (NIJ), NIJ Standard 0101.06, recommends estimating...
Output of the NIST Smart Grid Interoperability Panel's Priority Action Plan 2: Wireless Communication for smart Grid, working group. It contains a methodology...