Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1276 - 1300 of 2294

A 1D Spectral Image Validation/Verification Metric for Fingerprints

August 19, 2009
Author(s)
John M. Libert, John D. Grantham, Shahram Orandi
Image validation and verification are important functions in the acquisition of fingerprint images from live-scan devices and for assessing and maintaining the fidelity of fingerprint image databases. In addition to law enforcement, such databases are used

Users Manual for Version 2.1.5 of the NIST DMIS Test Suite (for DMIS 5.1)

August 19, 2009
Author(s)
Thomas R. Kramer, John A. Horst
The NIST DMIS Test Suite, version 2.1.5, is described. The test suite is intended to serve two purposes, 1) to help users and vendors use version 5.1 of DMIS (the Dimensional Measuring Interface Standard) and 2) to provide utilities and test files for

PRF-Security Revisited With New Efficient Single-Keyed Domain Extensions

August 17, 2009
Author(s)
Mridul Nandi
In this paper, we study a wide class of single-keyed domain extension algorithms, called generalized domain extension (\tx{GDE}), extending a keyed function $F_K : {0,1}^b \to {0,1}^n$ to a keyed function $\overline{F}_K : {0,1}^* \to {0,1}^n$, $K \in {0,1

Use of ISO/IEC 24727

August 14, 2009
Author(s)
Hildegard Ferraiolo, Teresa T. Schwarzhoff, William I. MacGregor, Hung Dang, Ketan Mehta
This document describes the use of ISO/IEC 24727 in enabling client-applications to access identity credentials issued by different credential issuers.

Optimizing Authentication in Media Independent Handovers using IEEE 802.21

August 6, 2009
Author(s)
Antonio Izquierdo Manzanares, Nada T. Golmie, Richard A. Rouil
In this paper we study the performance of the authentication process in media independent handovers, and consider the impact of using IEEE 802.21 link triggers to achieve seamless mobility. We describe all interactions between the 802.21 services and the

Facial Shape Analysis and Sizing System

July 24, 2009
Author(s)
Afzal A. Godil
The understanding of shape and size of the human head and faces is vital for design of facial wear products, such as respirators, helmets, eyeglasses and for ergonomic studies. 3D scanning is used to create 3D databases of thousands of humans from

Fast and Secure CBC Type MAC Algorithms

July 21, 2009
Author(s)
Mridul Nandi
The CBC-MAC, or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure over an arbitrary domain. There are several secure variants of CBC-MAC, among which

Security for Enterprise Telework and Remote Access Solutions

June 24, 2009
Author(s)
Karen A. Scarfone
Many people telework (also known as telecommuting), which is the ability for an organization s employees and contractors to perform work from locations other than the organization s facilities. Teleworkers use various client devices, such as desktop and

Vacuum-Gap Capacitors for Low-Loss Superconducting Resonant Circuits

June 16, 2009
Author(s)
Katarina Cicak, Michael S. Allman, Joshua Strong, Kevin Osborn, Raymond W. Simmonds
Low-loss microwave components are used in many superconducting resonant circuits from multiplexed readouts of low-temperature detector arrays to quantum bits. Two-level system (TLS) defects in amorphous dielectric materials cause excess energy loss. In an

Measuring Indoor Mobile Wireless Link Quality

June 14, 2009
Author(s)
Michael R. Souryal
This paper investigates methods for link quality measurement of an indoor, time-varying wireless link. Link quality estimates are used for a number of higher-layer functions, including rate adaptation, routing, and topology control. The objective is to

Backbone Construction for Heterogeneous Wireless Ad Hoc Networks

June 10, 2009
Author(s)
Yi Qian, Hui Guo, Nader Moayeri, Kejie Lu
In this paper, we propose a backbone construction scheme over heterogeneous ad hoc networks, where the network nodes have different characteristics such as communication capacity, processing power and energy resource. Most of the wireless backbone

Experimental Study of High Speed Polarization -Coding Quantum Key Distribution with Sifted -Key Rates Over Mbit/s

June 1, 2009
Author(s)
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Barry J. Hershman, Joshua C. Bienfang, David H. Su, Ronald F. Boisvert, Charles W. Clark, Carl J. Williams
We have demonstrated a polarization encoded, fiber-based quantum key distribution system operating at 850 nm in the B92 protocol. With a quantum bit transmission rate i.e. optical pulse driving frequency of 625 MHz and a mean photon number of 0.1, we
Was this page helpful?