NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-37, Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. Developed by NIST in partnership with
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2009. It discusses all projects and programs within the Division, staff highlights, and publications.
We propose a new method to narrow the linewidth of entangled photons from spontaneous parametric down conversion incorporated with an internal Bragg grating. We study and show that it is a promising way to generate narrow-line entangled photons.
A method is presented for computing pseudo-watershed lines that can be used for linking pixels that have been identified as edge pixels with the Canny edge detector. An additional procedure is also described for filling breaks that may still exist between
Joe Chalfoun, Antonio Cardone, Alden A. Dima, Michael Halter, Daniel P. Allen
In order to facilitate the extraction of quantitative data from live cell image sets, automated image analysis methods are needed. This paper presents an overlap-based cell tracking algorithm that has the ability to track cells across a set of time-lapse
This report summarizes the technical work of the Mathematical and Computational Sciences Division (MCSD) of NIST s Information Technology Laboratory. Part I (Overview) provides a high-level overview of the Division s activities, including highlights of
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing
Raju V. Datla, Ruediger Kessel, Allan W. Smith, Raghu N. Kacker, D. B. Pollock
Climate change monitoring requires long time series radiometric measurements using multiple optical sensors in multiple platforms covering the globe over decades. The problem of achieving traceability to SI units for these measurements is discussed. A
In this treatise, we propose a novel family of Asynchronous Cooperative Linear Dispersion Codes (ACLDCs),which is capable of maintaining full diversity in cooperative scenarios even at the presence of asynchronous reception. The linear dispersion structure
Joe Chalfoun, Antonio Cardone, Alden A. Dima, Michael Halter, Daniel P. Allen
In order to facilitate the extraction of quantitative data from live cell image sets, automated image analysis methods are needed. This paper presents an introduction to the general principle of an overlap cell tracking software developed by NIST. This
John M. Kelsey, Andrew R. Regenscheid, Tal Moran, David Chaum
In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three end-to-end voting systems: Punchscan, Pret-a-Voter, and Threeballot. We also demonstrate a
Imagine a computer that can exploit quantum mechanics to solve previously intractable problems in physics, mathematics and cryptography. Such a quantum computer would revolutionize computing technology while teaching us about fundamental physics and ways
This bulletin summarizes the information that was presented in NIST Interagency Report (NISTIR)7564, Directions in Security Metrics Research, by Wayne Jansen. The publication examines past efforts to develop security measurements that could help
We propose using an on-off fluid source model for queuing statistics under TCP. This model was originally introduced to model queuing statistics of ATM multiplexers by D.Anick, D.Mitra and M.M.Sondhi. A good approximation for packet loss probability is
Helin Dutagaci, Afzal A. Godil, Bulent Sankur, Yucel Yemez
View-based indexing schemes for 3D object retrieval is gaining popularity since they provide good retrieval results. These schemes are coherent with the theory that humans recognize objects based on their 2D appearances. The view-based techniques also
Common Logic (CL) is an ISO standard that specifies a family of knowledge representation languages. The function of modules within CL is to support local context with a local domains of discourse. Modules play a crucial role since they enable users to
This report summarizes the work of the Complex Systems Program within NIST s Information Technology Laboratory. The Overview presents some background material and a high-level overview of the Program s activities including significant technical
In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors, however most of the existing
This Editor In Chief's (EIC) message is expected to appear in the January, 2010 issue of the IEEE Transactions on CAS for Video Technology (TCSVT). The editorial team will be under the leadership of the new EIC for a period of two years.
Tanya L. Brewer, Annie W. Sokol, Sheldon A. Durrant
Privilege management is large and complex, often the source of heated debate and opinion, and fraught with widely-understood, yet ill-defined terminology and concepts. The National Institute of Standards and Technology (NIST) and the National Security
We consider a superconducting phase qubit consisting of a monocrystalline sapphire Josephson junction with symmetry axis perpendicular to the junction interfaces. Via the London gauge we present a theoretical model of Fe3+ magnetic impurities within the