Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1176 - 1200 of 1509

Guide for Developing Security Plans for Information Technology Systems

February 24, 2006
Author(s)
Marianne M. Swanson, Joan Hash, Pauline Bowen
The objective of system security planning is to improve protection of information system resources. All federal systems have some level of sensitivity and require protection as part of good management practice. The protection of a system must be documented

Biometrics Standards ? Rising to the Challenge of Technology Innovation

February 1, 2006
Author(s)
Fernando L. Podio
For decades, biometric technologies were primarily used in law enforcement applications. Currently, they are increasingly being required in multiple public and private sector applications worldwide to authenticate a person?s identity, secure national

Computer Security Division 2005 Annual Report

February 1, 2006
Author(s)
Tanya L. Brewer, Matthew A. Scholl
This report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during the Fiscal Year 2005. It discusses all projects and programs within the Division, staff highlights, and publications. For

Personal Identity Verification Card Management Report

January 6, 2006
Author(s)
James F. Dray Jr., David Corcoran
NIST Special Publication 800-73 (http://piv.nist.gov) provides technical specifications for Personal Identity Verification (PIV) cards. However, it does not contain a complete card management specification for PIV systems. This Report provides an overview

Cryptographic Primitives Can Be Fragile

January 3, 2006
Author(s)
Rene C. Peralta
We show that a well-known coin-flipping protocol is breakable in the sense that one of the parties can pre-determine the result of the coin-flip. The way in which the protocol fails is illustrative of the fact that there are insecure ways of using secure

Application of Beamforming in Wireless Location Estimation

January 1, 2006
Author(s)
Kamran Sayrafian, D Kaspar
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Source-Assisted Direction Estimation Inside Buildings

January 1, 2006
Author(s)
Kamran Sayrafian, D Kaspar
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

E-Government Security Issues and Measures

December 30, 2005
Author(s)
William C. Barker
The Handbook will be a three-volume, 2,400-page reference source providing state-of-the-art information concerning the information, computer and network security with coverage of the core topics. The audience is four-year colleges and universities with

HL7 Experimental Registry

December 12, 2005
Author(s)
William J. Majurski, A Mccaffrey, Mary T. Laamanen
Our results extending Kuhn's fault class hierarchy provide a justification for the focus of fault-based testing strategies on detecting particular faults and ignoring others. We develop a novel analytical technique that allows us to elegantly prove that

Guide to IPsec VPNs: Recommendations of the National Institute of Standards and Technology

December 1, 2005
Author(s)
Sheila E. Frankel, Karen Kent, Ryan Lewkowski, Angela Orebaugh, Ronald Ritchey, Steven Sharma
IPsec is a framework of open standards for ensuring private communications over public networks. It has become the most common network layer security control, typically used to create a virtual private network (VPN). A VPN is a virtual network ,built on
Was this page helpful?