An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Alan Mink, Xiao Tang, Lijun Ma, Anastase Nakassis, Barry J. Hershman, Joshua C. Bienfang, David H. Su, Ronald F. Boisvert, Charles W. Clark, Carl J. Williams
NIST has developed a high-speed quantum key distribution (QKD) test bed incorporating both free-space and fiber systems. These systems demonstrate a major increase in the attainable rate of QKD systems: over two orders of magnitude faster than other
Source direction estimation inside building is a difficult and challenging task due to severe multipath signal propagation. Numerous algorithms and techniques exist that provide high-resolution direction estimation under certain conditions and channel
Kotikalapudi Sriram, Douglas Montgomery, Oliver Borchert, Okhee Kim, D. Richard Kuhn
BGP peering session attacks are known to drive routes into route flap damping (RFD) suppression states and thus cause isolations between autonomous systems (ASes) and destinations. We present a detailed study of the impact of BGP peering session attacks
Alan Mink, Xiao Tang, Lijun Ma, Anastase Nakassis, Barry J. Hershman, Joshua Bienfang, David H. Su, Ronald Boisvert, Charles W. Clark, Carl J. Williams
NIST has developed a high-speed quantum key distribution (QKD) test bed incorporating both free-space and fiber systems. These systems demonstrate a major increase in the attainable rate of QKD systems: over two orders of magnitude faster than other
Anastase Nakassis, Joshua Bienfang, P. Johnson, Alan Mink, D. Rogers, Xiao Tang, Carl J. Williams
Quantum cryptography asserts that shared secrets can be established over public channels in such a way that the total information of an eavesdropper can be made arbitrarily small with probability arbitrarily close to 1. As we will show below, the current
Michael R. Souryal, Luke Klein-Berndt, Leonard E. Miller, Nader Moayeri
This paper presents the empirical results and analysis of a link variability study for an indoor, stationary 802.11 network subject to external interference. The objective is to characterize the relationships between the packet loss rate on a link and the
David E. Cypher, Nicolas Chevrollier, Nicolas Montavont, Nada T. Golmie
The objectives of this article are to survey the benefits and challenges that poise the deployment and operation of wireless communications in support of healthcare networks. While the main advantages of wireless communications remain to provide ubiquitous
Leonard E. Miller, Perry F. Wilson, Nelson P. Bryner, Michael H. Francis, Jeffrey R. Guerrieri, D W. Stroup, Luke Klein-Berndt
An indoor localization and communication project is described that proposes to use RFID tags, placed in the building beforehand, as navigation waypoints for an inertial navigation system carried by a first responder. The findings from the first year of the
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Haolang Xu, Barry J. Hershman, Carl J. Williams, Joshua Bienfang, David H. Su, Ronald Boisvert, Charles W. Clark
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal
This work proposes a distributed fault protection mechanism called the Dynamic-Shared Segment Protection (DSSP) algorithm for WDM (Wavelength Division Multiplexing) mesh networks. The study explores the shared protection scheme in the network with
Gregory C. Tassey, Douglas C. Montgomery, Alfred Lee, Tim Sloan
The Presidents National Strategy to Secure Cyberspace (National Strategy) directed the Secretary of Commerce to form a task force to examine the most recent iteration of the Internet Protocol, IP version 6 (IPv6). The President charged the task force with
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
Channel-adaptive relaying has recently been proposed as a means to exploit spatial and temporal diversity in multihop ad hoc networks with fading. In conjunction with appropriate routing protocols, adaptive relaying enables each forwarding node in a
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
Routing infrastructures are possibly the most vital, complex, and fragile components in the global information infrastructure. They are also the least protected from attack. In the public Internet, for example, the IP routing infrastructure comprises tens
Sheila E. Frankel, Karen Kent, Ryan Lewkowski, Angela Orebaugh, Ronald Ritchey, Steven Sharma
IPsec is a framework of open standards for ensuring private communications over public networks. It has become the most common network layer security control, typically used to create a virtual private network (VPN). A VPN is a virtual network ,built on
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
Ultra wideband technology shows promise for precision ranging due to its fine time resolution to resolve multipath fading and the presence of lower frequencies in the baseband to penetrate walls. While a concerted effort has been conducted in the
Nicolas Chevrollier, Nicolas Montavont, Nada T. Golmie
In this article, we consider candidate wireless technologies such as IEEE 802.11b, and IEEE 802.15.4 that can support medical and healthcare informatics applications. The main questions that we try to answer are: (1) is there any potential for significant
Kotikalapudi Sriram, David W. Griffith, G Di Lorenzo, Oliver Borchert, Nada T. Golmie
Agile all optical cross-connect (OXC) switches currently use an architecture in which regenerators and transceivers have pre-assigned and fixed directionality. However, technology is evolving to enable new OXC architectures in which the directionality of
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Barry J. Hershman, Joshua Bienfang, Ronald Boisvert, Charles W. Clark, Carl J. Williams, A Gross, E Hagley, J Wen
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled