Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1226 - 1250 of 1509

RFID 101

June 1, 2005
Author(s)
Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Second Primages on n-bit Hash Functions for Much Less than 2n Work

May 1, 2005
Author(s)
John M. Kelsey, B Schneier
We expand a previous result of Dean[Dea99] to provide a second preimage attack on all n-bit iterated hash functions with Damgard-Merkle strengthening and n-bit intermediate states, allowing a second preimage to be found for a 2k-message-block message with

An Overview and Analysis of PDA Forensic Tools

April 2, 2005
Author(s)
Wayne Jansen, Richard Ayers
Mobile handheld devices are becoming evermore affordable and commonplace in society. When they are involved in a security incident or crime, forensic specialists require tools that allow proper extraction and speedy examination of any digital evidence

Performance Analysis of Exponential Backoff

April 1, 2005
Author(s)
B J. Kwak, N O. Song, Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Real-time Applications for Sensor Networks

April 1, 2005
Author(s)
Hamid Gharavi
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Characterizing the Risks and Costs of BGP Insecurity/Security

March 1, 2005
Author(s)
Douglas Montgomery, Kotikalapudi Sriram, Oliver Borchert, Okhee Kim, D. Richard Kuhn
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

Personal Identity Verification (PIV) of Federal Employees and Contractors

February 1, 2005
Author(s)
William Barker, James F. Dray Jr., Ramaswamy Chandramouli, Teresa T. Schwarzhoff, Tim Polk, Donna F. Dodson, Ketan Mehta, S Gupta, William E. Burr, Timothy Grance, National Institute of Standards and Technology (NIST)
[Superseded by FIPS 201-1 (March 2006): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50836] FIPS 201 specifies the technical and operational requirements for interoperable PIV systems that issue smart cards as identification credentials and

Integrating IT Security into the Capital Planning and Investment Control Process

January 1, 2005
Author(s)
Joan Hash, N Bartol, H Rollins, W Robinson, J Abeles, S Batdorff
Traditionally, information technology (IT) security and capital planning and investment control (CPIC) processes have been performed independently by security and capital planning practitioners. However, the Federal Information Security Management Act

Ad-hoc Network Systems and Applications

November 1, 2004
Author(s)
Hamid Gharavi
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Optical Control and Management Security Standards for the GIG-BE

October 31, 2004
Author(s)
Renee Esposito, Sheila E. Frankel, Richard Graveman, Scott McNown
This paper presents an overview of requirements and standards development activities for securing the control and management infrastructure protocols for optical networking protocols used in the Global Information Grid-Bandwidth Expansion (GIG-BE). Our

Guide to Public Safety Applications of Wireless Technology

October 1, 2004
Author(s)
Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Securely Connecting the World with Cyber Security Standards

October 1, 2004
Author(s)
Alicia Clay Jones, Michael Hogan
This paper focuses on some of the key roles that cyber security standards play in securely connecting our cyber world. Cyber security standards can be categorized as technical, management, or testing standards. All three types of standards are necessary to

Securing Voice Over Internet Protocol (IP) Networks

October 1, 2004
Author(s)
Thomas J. Walsh, David R. Kuhn
Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibility are
Was this page helpful?