NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Computer systems often exhibit degraded performance due to resource leakage caused by erroneous programming or malicious attacks, and computers can even crash in extreme cases of resource exhaustion. The advent of cloud computing provides increased
Mark L. Badger, David Bernstein, Robert B. Bohn, Frederic J. de Vaulx, Michael D. Hogan, Jin Mao, John V. Messina, Kevin L. Mills, Annie W. Sokol, Dawn M. Leaf, Fred Whiteside, Jin Tong
Jin Chu Wu, Alvin F. Martin, Craig S. Greenberg, Raghu N. Kacker
The National Institute of Standards and Technology (NIST) Speaker Recognition Evaluations (SRE) are an ongoing series of projects conducted by NIST. In the NIST SRE, speaker detection performance is measured using a detection cost function, which is
Yooyoung Lee, Ross J. Micheals, James J. Filliben, P J. Phillips, Hassan A. Sahibzada
Due to its distinctiveness, the human eye is a popular biometricv feature used to identity a person with high accuracy. The Grand Challenge in biometrics is to have an effective algorithm for subject verification or identification under a broad range of
With the increasing adoption of cloud computing service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has become a
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam
This paper is concerned with target monitoring using a network of collaborative mobile sensors. The objective is to compute (online) the desired sensing and communication radii of sensors as well as their location at each time instant, such that a set of
Jin Chu Wu, Alvin F. Martin, Craig S. Greenberg, Raghu N. Kacker
The National Institute of Standards and Technology (NIST) has been conducting an ongoing series of Speaker Recognition Evaluations (SRE). Speaker detection performance is measured using a detection cost function defined as a weighted sum of the
R. Feng and H.Wu recently established a certain mean-value formula for the coordinates of the n-division points on an elliptic curve given inWeierstrass form (A mean value formula for elliptic curves, 2010, available at http://eprint.iacr.org/2009/586.pdf)
Giving individuals this kind of information processing power, along with unprecedented connectivity, might be the single most impressive technical achievement of the 21st century. Nobody knows what the full impact of this transformation will be, but it's
Dear Password, Its time for you to retire. Youve served us well, but the reality is that youre woefully outdated and fundamentally insecure. Moreover, our reliance on you is making it difficult to move some very interesting and valuable types of
This paper describes a number of techniques using jQuery to take advantage of the 3D descriptive markup implemented by X3DOM. X3DOM is a project of the Web3D Consortium, primarily being implemented by staff at Fraunhoffer IGD to provide 3D descriptive
Tony V. Cheneau, Maryline Laurent, Andrei V. Sambra
This paper presents a new public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication and Key Exchange Scheme. Its originality lies in performing authentication and key distribution with no need for a trusted
This report is an extension of the Two Finger Matching with Vendor SDK Matches [1] which evaluated the accuracy of matching two plain fingers (right index and left index) with vendor proprietary fingerprint templates. This study is based on NISTs
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-137, Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. The guide helps organizations develop an ISCM strategy and
This paper presents a framework for analysis of the coverage and capacity of advanced metering over a wide area cellular network. The coverage analysis predicts the maximum cell size subject to an outage criterion, and the capacity analysis predicts the
Mary F. Theofanos, Brian C. Stanton, Yee-Yin Choong, Haiying Guan
Compared with traditional password and other identification methods, biometrics like face, iris, and fingerprint for automatic personal identification/verification have many advantages, and are increasingly gaining popularity in all kinds of applications
Experimenters characterize the behavior of simulation models for data communications networks by measuring multiple responses under selected parameter combinations. The resulting multivariate data may include redundant responses reflecting aspects of a
David A. Waltermire, Stephen D. Quinn, Adam M. Halbardier, Karen Scarfone
This document provides the definitive technical specification for version 1.2 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which information about software
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Kaveh Moezzi, Amir G. Aghdam
In this paper, various sensor deployment strategies are studied for effective coverage in wireless sensor networks. In the proposed algorithms, each sensor discovers the coverage holes within its Voronoi polygons, and then moves in a proper direction to
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-128, Guide to Security-Focused Configuration Management of Information Systems. The publication was written by Arnold Johnson, Kelley Dempsey, and Ron Ross of NIST, and
This document is the action plan to improve the suitability of Health Level Seven (HL7) Implementation Guide for CDA Release 2 Quality Reporting Document Architecture (QRDA) Release 1 for quality reporting. Lantana Consulting Group prepared this report
This document analyzes the suitability of Quality Reporting Data Architecture (QRDA) to meet its purpose and to support the US Department of Health and Human Services (HHS) Meaningful Use. It is part of the Healthcare Information Technology (HIT)
Gregory A. Sanders, Sherri Condon, Mark Arehart, Dan Parvaz, Christy Doran, John Aberdeen
The Defense Advanced Research Projects (DARPA) Spoken Language Communication and Translation System for Tactical Use (TRANSTAC) program faced many challenges in applying automated measures of translation quality to Iraqi Arabic-English speech translation