An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Stephen D. Quinn, David A. Waltermire, Christopher S. Johnson, Karen A. Scarfone, John F. Banghart
This document defines the technical specification for Version 1.0 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software communicates
Increasing demand for high quality multimedia services has been a driving factor in the technological evolution of high bandwidth wireless/mobile communications systems and standards. The most challenging aspect is the support of higher quality video
In mobile networks, authentication is a time-consuming operation that needs to be shortened in order to provide seamless handovers. Furthermore, the time required for negotiating security parameters and obtaining security policies increases the importance
Firewalls are essential devices or programs that help organizations protect their networks and systems, and help home users protect their computers, from hostile attacks, break-ins, viruses, and malicious software. Firewalls control the flow of network
Over the last thirty years, much research has been done on the development of failure event databases and fatigue modeling of crack growth in pressure vessels and piping. According to a USNRC report (NUREG/CR6674, 2000), results of a fatigue crack growth
This study compared random and t-way combinatorial inputs of a network simulator, to determine if these two approaches produce significantly different deadlock detection for varying network configurations. Modeling deadlock detection is important for
Provides some first-order techniques for analyzing matcher performance. A novel argument is used to derive the power-law as a kind of baseline for analyzing matcher performance. The power-law is then applied to two situations: a) CMC curves, and b) fusion
A compact scheme for high-speed frequency doubling and down-conversion on a single dual-element PPKTP waveguide is investigated. Optimal temperature selection for the entire waveguide is achieved and coincidence is observed. A pulsed pump scheme is used to
This paper describes some practical administrative issues and challenges in the deployment of DNSSEC - an IETF specified suite of security measures for securing the Domain Name System (DNS). The issues covered include: (a) Choice of Cryptographic
To create effective and accurate two-way, free form, spoken language translation devices, they must be supplied with appropriate training data. The goal of the DARPA TRANSTAC (Spoken Language Communication and Translation System for Tactical Use) program
[Superseded by NISTIR 7621 Rev. 1 (November 2016): https://www.nist.gov/node/1111801 ] For some small businesses, the security of their information, systems, and networks might not be a high priority, but for their customers, employees, and trading
This report contains a list of selected acronyms and abbreviations for system and network security terms with their generally accepted or preferred definitions. It is intended as a resource for Federal agencies and other users of system and network
Craig I. Schlenoff, Brian A. Weiss, Michelle P. Steves, Gregory A. Sanders, Frederick M. Proctor, Ann M. Virts
The Spoken Language Communication and Translation System for Tactical Use (TRANSTAC) program is a Defense Advanced Research Projects Agency (DARPA) advanced technology research and development program. The goal of the TRANSTAC program is to demonstrate
Deepak Sharma, Dhananjay Anand, Ya-Shian Li-Baboud, James Moyne
Shrinking process tolerances due to decreasing device sizes and increasing chip complexity in semiconductor manufacturing are motivating efforts to improve methods for real-time networked process control. Prior work shows that the lack of precise time
Achieving next-generation factory (NGF) goals has been an industry challenge for APC applications to acquire a sufficient level of data quality to maximize the benefits of automation. For example, it is difficult to get accurate timestamps because sensor
This bulletin summarizes the information in Federal Information Processing Standard (FIPS) Publication 186-3, Digital Signature Standard (DSS). Approved in June 2009 by the Secretary of Commerce for use by federal government agencies in protecting the
Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless the
Luisa Bentivogli, Ido Dagan, Hoa T. Dang, Danilo Giampiccolo, Medea L. Leggio, Bernardo Magnini
In the 2009 Recognizing Textual Entailment (RTE) challenge, a Search Pilot task has been introduced, aimed at finding all the sentences in a corpus which entail a set of given hypotheses. The preparation of the data set for this task has provided an
This Recommendation specifies security requirements for authentication methods with key establishment supported by the Extensible Authentication Protocol (EAP) defined in IETF RFC 3748 for wireless access authentications to federal networks.
Kamran Sayrafian, Wen-Bin Yang, John G. Hagedorn, Judith E. Terrill, Kamya Yazdandoost
Knowledge of the propagation media is a key step toward a successful transceiver design. Such information is typically gathered by conducting physical experiments, measuring and processing the corresponding data to obtain channel characteristics. In case
With the proliferation of computers to process, store, and transfer information, manufacturers are suffering increasing costs due to information incompatibilities. The information incompatibility problem in manufacturing quality is costly to everyone