An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In this paper we propose a new sequential mode of operation the Fast wide pipe or FWP for short - to hash messages of arbitrary length. The mode is shown to be (1) preimage-resistance preserving, (2) collision-resistance-preserving and, most importantly
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the process of finding such flaws and developing exploits seems to be chaotic
Technical standards offer a new ability to support the important public policy goal of better protecting privacy. To do so most effectively, we must begin to move from the privacy standards based on subjective and procedural efforts to a series of
Simulation models for data communications networks encompass numerous parameters that can each take on millions of values, presenting experimenters with a vast space of potential parameter combinations. To apply such simulation models experimenters face a
Most simulation models for data communication networks encompass hundreds of parameters that can each take on millions of values. Such models are difficult to understand, parameterize and investigate. This paper explains how to model a modern data
This bulletin summarizes the information presented in NISTIR 7497, Security Architecture Design Process for Health Information Exchanges (HIEs). The publication describes a systematic approach to designing a technical security architecture for the exchange
This document provides a template for the modified version of Software engineering Software product Quality Requirements and Evaluation(SQuaRE) Common Industry Format (CIF) for usability test reports (ISO/IEC 25062:2006(E)), the Common Industry Format (CIF
Michael Grasso, Ronil Mokashi , Alden A. Dima, Antonio Cardone, Kiran Bhadriraju, Anne L. Plant, Mary C. Brady, Yaacov Yesha, Yelena Yesha
The traditional method of cell microscopy can be subjective, due to observer variability, a lack of standardization, and a limited feature set. To address this challenge, we developed an image classifier using a machine learning approach. Our system was
David W. Griffith, Michael R. Souryal, Camillo A. Gentile, Nada T. Golmie
This paper introduces an IEEE 802.11 analytical model that examines uplink and downlink communications between non-saturated stations and a non-saturated access point. The model integrates channel effects and collisions into a single expression for the
Call admission control between heterogeneous networks,such as an integrated 3GPP LTE and WLAN network, plays an important role to utilize the system resources in a more efficient way. In this paper, we propose that the preference to the WLAN is determined
This bulletin summarizes the information presented in NISTIR 7628, Guidelines for Smart Grid Cyber Security. The guidelines were developed as a consensus document by the Cyber Security Working Group (CSWG) of the Smart Grid Interoperability Panel (SGIP), a
Julien M. Amelot, Clement Vasseur, Jeffrey Fletcher, Dhananjay Anand, Ya-Shian Li-Baboud, James Moyne
Wide-area monitoring applications for power distribution rely on accurate global time synchronization. Furthermore, there is interest in replacing current time synchronization methods such as IRIG, with distributed time synchronization protocols that
Alan B. Vinh, Richard A. Rouil, Antonio Izquierdo Manzanares, Alexandre Delye
There are two parts to the Project 25: Inter-RF Subsystem Interface (ISSI) model: 1) The server program that models the behavior of the ISSI protocol(s), along with the server that allows interaction with the graphical user interface application (GUI). 2)
This manual is a maintainers manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The manual is
This manual is a system builders manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The
This manual is a users manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The manual
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents. An intrusion detection and prevention system (IDPS) is software that automates the intrusion detection
Charles D. Fenimore, Andrew Buckler, Lawrence H. Schwartz, Nicholas Petrick, Michael McNitt-Gray, Binsheng Zhao, Anthony P. Reeves, P. David Mozeley, Ricardo S. Avila
The drug development industry is faced with increasing costs and decreasing success rates. New ways to understand biology as well as the increasing interest in personalized treatments for smaller patient segments requires new capabilities for the rapid
A critical challenge for military personnel when operating in foreign countries is effective communication with the local population. To address this issue, the Defense Advanced Research Projects Agency (DARPA) created the Spoken Language Communication and
Safety systems have used the concept of safety integrity levels (SILs) for almost two decades. This allows the safety of a component or system to be represented by a single number that defines a protection factor required to ensure the health and safety of
A Bloom filter is a space-efficient data structure used for probabilistic set membership testing. When testing an object for set membership, a Bloom filter may give a false positive. The analysis of the false positive rate is key to understanding the Bloom
The term trust has had a well understood definition for centuries. However after e-trust came along, and then cloud, where e-trust is not sufficient due to the non-touchability of a public cloud, the need to reconsider what trust means for a public cloud
Cyber-physical systems feature a tight combination of a system's computational and physical elements. Understanding how to assess and design trustworthiness into these complex systems of systems remains an unsolved problem. This issue offers insights into