An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
OMB Memorandum M-05-22 directed the National Institute of Standards and Technology (NIST) to develop the technical infrastructure (standards and testing) necessary to support wide scale adoption of IPv6 in the US Government (USG). Upon detailed inspection
Dhananjay Anand, Deepak Sharma, Ya-Shian Li-Baboud, James Moyne
Shrinking process tolerances due to decreasing device sizes and increasing chip complexity in semiconductor manufacturing are motivating efforts to improve methods of Equipment Data Acquisition (EDA). Prior work shows that the lack of precise time-stamping
Ultra Wide-Band (UWB) is a favorable technology for wearable medical sensors that monitor vital signs and other health-related information. Efficient transceiver design requires in-depth understanding of the propagation media which in this case is the
Increasing demand for high quality multimedia services has been a driving factor in the technological evolution of high bandwidth wireless/mobile communications systems and standards. The most challenging aspect is the support of higher quality video
In mobile networks, authentication is a time-consuming operation that needs to be shortened in order to provide seamless handovers. Furthermore, the time required for negotiating security parameters and obtaining security policies increases the importance
A compact scheme for high-speed frequency doubling and down-conversion on a single dual-element PPKTP waveguide is investigated. Optimal temperature selection for the entire waveguide is achieved and coincidence is observed. A pulsed pump scheme is used to
This report contains a list of selected acronyms and abbreviations for system and network security terms with their generally accepted or preferred definitions. It is intended as a resource for Federal agencies and other users of system and network
Firewalls are devices or programs that control the flow of network traffic between networks or hosts employing differing security postures. This publication provides an overview of several types of firewall technologies and discusses their security
This Recommendation specifies security requirements for authentication methods with key establishment supported by the Extensible Authentication Protocol (EAP) defined in IETF RFC 3748 for wireless access authentications to federal networks.
Kamran Sayrafian, Wen-Bin Yang, John G. Hagedorn, Judith E. Terrill, Kamya Yazdandoost
Knowledge of the propagation media is a key step toward a successful transceiver design. Such information is typically gathered by conducting physical experiments, measuring and processing the corresponding data to obtain channel characteristics. In case
Xiao Tang, Lijun Ma, Oliver T. Slattery, Tiejun Chang
We have experimentally implemented a non-degenerate sequential time-bin entangled photon-pair source using a periodically poled potassium titanyl phosphate (PPKTP) waveguide at a clock rate of 1 GHz. The wavelengths of the signal and idler are 895 and 1310
We developed low-noise up-conversion single photon detectors for 1310 nm based on a periodically-poled LiNbO3 (PPLN) waveguide. The low-noise feature is achieved by using a pulsed optical pump at a wavelength longer than the signal wavelength. The
Antonio Izquierdo Manzanares, Nada T. Golmie, Richard A. Rouil
In this paper we study the performance of the authentication process in media independent handovers, and consider the impact of using IEEE 802.21 link triggers to achieve seamless mobility. We describe all interactions between the 802.21 services and the
We developed an up-conversion spectrometer for signals at single photon levels near the infrared region based on a tunable up-conversion detector which uses a periodically poled lithium niobate (PPLN) waveguide as the conversion medium. We also
We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity. We also provide an overview of the two most widely used commodity security protocols, IPsec
The loss of a set of wireless network access resources causes every mobile user that is connected through the failed resources to perform an unanticipated hard handover, resulting in disrupted connections. The users connected to the failed resources can be
This paper investigates methods for link quality measurement of an indoor, time-varying wireless link. Link quality estimates are used for a number of higher-layer functions, including rate adaptation, routing, and topology control. The objective is to
In this paper, we propose a backbone construction scheme over heterogeneous ad hoc networks, where the network nodes have different characteristics such as communication capacity, processing power and energy resource. Most of the wireless backbone
The number of devices that implement Ethernet interfaces on the factory floor is growing at an exponential rate along with the adoption of industrial-grade Ethernet networks on the plant floor. In addition to the sheer number of devices using industrial
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Barry J. Hershman, Joshua C. Bienfang, David H. Su, Ronald F. Boisvert, Charles W. Clark, Carl J. Williams
We have demonstrated a polarization encoded, fiber-based quantum key distribution system operating at 850 nm in the B92 protocol. With a quantum bit transmission rate i.e. optical pulse driving frequency of 625 MHz and a mean photon number of 0.1, we
Anastase Nakassis, Joshua C. Bienfang, Paul M. Johnson, Alan Mink, D J. Rogers, Xiao Tang, Carl J. Williams
Quantum cryptography asserts that shared secrets can be established over public channels in such a way that the total information of an eavesdropper can be made arbitrarily small with probability arbitrarily close to 1. As we will show below, the current
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Hai Xu, Barry J. Hershman, Joshua C. Bienfang, David H. Su, Ronald F. Boisvert, Charles W. Clark, Carl J. Williams
A complete fiber-based polarization encoding quantum key distribution (QKD) system based on the BB84 protocol has been developed at National Institute of Standard and Technology (NIST). The system can be operated at a sifted key rate of more than 4 Mbit/s
NIST has developed a number of complete fiber-based high-speed quantum key distribution QKD)systems that includes an 850 nm QKD system for a local area network (LAN), a 1310 nm QKD system for a metropolitan area network (MAN), and a 3-node quantum network
Xiao Tang, Lijun Ma, Sae Woo Nam, Burm Baek, Oliver T. Slattery, Alan Mink, Hai Xu, Tiejun Chang
We have implemented a differential-phase-shift (DPS) quantum key distribution (QKD) system at 1310 nm with superconducting single photon detectors (SSPD). The timing jitter of the SSPDs is small and its dark counts are very low. 1310 nm is an ideal quantum