An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Xiao Tang, Lijun Ma, Oliver T. Slattery, Tiejun Chang
We have experimentally implemented a non-degenerate sequential time-bin entangled photon-pair source using a periodically poled potassium titanyl phosphate (PPKTP) waveguide at a clock rate of 1 GHz. The wavelengths of the signal and idler are 895 and 1310
We developed low-noise up-conversion single photon detectors for 1310 nm based on a periodically-poled LiNbO3 (PPLN) waveguide. The low-noise feature is achieved by using a pulsed optical pump at a wavelength longer than the signal wavelength. The
This bulletin summarizes the information presented in NIST Special Publication 800-53, Revision 3, Recommended Security Controls for Federal Information Systems and Organizations, on the catalog of security controls for information systems. These best
Three dimensional shape retrieval is a fairly new concept being studied all over the world. It is notable and essential because it can be applied to multiple disciplines in society, including: computer vision, CAD models, computer graphics, molecular
Image validation and verification are important functions in the acquisition of fingerprint images from live-scan devices and for assessing and maintaining the fidelity of fingerprint image databases. In addition to law enforcement, such databases are used
The NIST DMIS Test Suite, version 2.1.5, is described. The test suite is intended to serve two purposes, 1) to help users and vendors use version 5.1 of DMIS (the Dimensional Measuring Interface Standard) and 2) to provide utilities and test files for
In this paper, we study a wide class of single-keyed domain extension algorithms, called generalized domain extension (\tx{GDE}), extending a keyed function $F_K : {0,1}^b \to {0,1}^n$ to a keyed function $\overline{F}_K : {0,1}^* \to {0,1}^n$, $K \in {0,1
This paper provides an improved security analysis of popular pseudorandom functions (PRF) based on an $n$-bit pseudorandom permutation (PRP). In CRYPTO-05, an improved security analysis of \tx{CBC} (with prefix-free message space) was shown. The similar
Hildegard Ferraiolo, Teresa T. Schwarzhoff, William I. MacGregor, Hung Dang, Ketan Mehta
This document describes the use of ISO/IEC 24727 in enabling client-applications to access identity credentials issued by different credential issuers.
Antonio Izquierdo Manzanares, Nada T. Golmie, Richard A. Rouil
In this paper we study the performance of the authentication process in media independent handovers, and consider the impact of using IEEE 802.21 link triggers to achieve seamless mobility. We describe all interactions between the 802.21 services and the
We developed an up-conversion spectrometer for signals at single photon levels near the infrared region based on a tunable up-conversion detector which uses a periodically poled lithium niobate (PPLN) waveguide as the conversion medium. We also
The understanding of shape and size of the human head and faces is vital for design of facial wear products, such as respirators, helmets, eyeglasses and for ergonomic studies. 3D scanning is used to create 3D databases of thousands of humans from
This bulletin summarizes information about the Risk Management Framework (RMF) and points to NIST standards and guidelines that assist agencies in achieving effective security for their information technology (IT) systems. The RMF guides agencies through a
The CBC-MAC, or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure over an arbitrary domain. There are several secure variants of CBC-MAC, among which
We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity. We also provide an overview of the two most widely used commodity security protocols, IPsec
Many people telework (also known as telecommuting), which is the ability for an organization s employees and contractors to perform work from locations other than the organization s facilities. Teleworkers use various client devices, such as desktop and
The loss of a set of wireless network access resources causes every mobile user that is connected through the failed resources to perform an unanticipated hard handover, resulting in disrupted connections. The users connected to the failed resources can be
Katarina Cicak, Michael S. Allman, Joshua Strong, Kevin Osborn, Raymond W. Simmonds
Low-loss microwave components are used in many superconducting resonant circuits from multiplexed readouts of low-temperature detector arrays to quantum bits. Two-level system (TLS) defects in amorphous dielectric materials cause excess energy loss. In an
This paper investigates methods for link quality measurement of an indoor, time-varying wireless link. Link quality estimates are used for a number of higher-layer functions, including rate adaptation, routing, and topology control. The objective is to
In this paper, we propose a backbone construction scheme over heterogeneous ad hoc networks, where the network nodes have different characteristics such as communication capacity, processing power and energy resource. Most of the wireless backbone
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Barry J. Hershman, Joshua C. Bienfang, David H. Su, Ronald F. Boisvert, Charles W. Clark, Carl J. Williams
We have demonstrated a polarization encoded, fiber-based quantum key distribution system operating at 850 nm in the B92 protocol. With a quantum bit transmission rate i.e. optical pulse driving frequency of 625 MHz and a mean photon number of 0.1, we