An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Anastase Nakassis, Joshua C. Bienfang, Paul M. Johnson, Alan Mink, D J. Rogers, Xiao Tang, Carl J. Williams
Quantum cryptography asserts that shared secrets can be established over public channels in such a way that the total information of an eavesdropper can be made arbitrarily small with probability arbitrarily close to 1. As we will show below, the current
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Hai Xu, Barry J. Hershman, Joshua C. Bienfang, David H. Su, Ronald F. Boisvert, Charles W. Clark, Carl J. Williams
A complete fiber-based polarization encoding quantum key distribution (QKD) system based on the BB84 protocol has been developed at National Institute of Standard and Technology (NIST). The system can be operated at a sifted key rate of more than 4 Mbit/s
Charles D. Fenimore, James H. Yen, John W. Roberts, Hassan A. Sahibzada
We have conducted an evaluation comparing the interpretability potential of two standardized HD formats, 1080p30 and 720p60. Despite the lack of an existing motion image (MI) quality scale akin to the NIIRS scale, we have exploited previous work on MI
NIST has developed a number of complete fiber-based high-speed quantum key distribution QKD)systems that includes an 850 nm QKD system for a local area network (LAN), a 1310 nm QKD system for a metropolitan area network (MAN), and a 3-node quantum network
IT systems have long been at risk from vulnerable software, malicious actions, or inadvertent user errors, in addition to run-of-the-mill natural and human-made disasters. As we discussed in the last issue ( Surviving Insecure IT: Effective Patch
Janice G. Redish, Dana Chisnell, Ethan Newby, Sharon J. Laskowski, Svetlana Z. Lowry
In this study, we compared two ballots that differed only in wording and presentation of the language on the ballots. For Ballot A, we used conventional wording and presentation, taken from typical ballots. For Ballot B, we used plain language wording and
Xiao Tang, Lijun Ma, Sae Woo Nam, Burm Baek, Oliver T. Slattery, Alan Mink, Hai Xu, Tiejun Chang
We have implemented a differential-phase-shift (DPS) quantum key distribution (QKD) system at 1310 nm with superconducting single photon detectors (SSPD). The timing jitter of the SSPDs is small and its dark counts are very low. 1310 nm is an ideal quantum
Nicolas Chevrollier, David W. Griffith, Nada T. Golmie, SuKyoung Lee, Kyungsoo Kim, Hong Kunho, YoonHyuk Kim
In an integrated WLAN and cellular network, if all mobile users whose connections originate in the cellular network migrate to the WLAN whenever they enter the double coverage area, the WLAN will be severely congested and its users will suffer from
Alan Mink, Joshua C. Bienfang, Robert J. Carpenter, Lijun Ma, Barry J. Hershman, Alessandro Restelli, Xiao Tang
We discussed custom instrumentation for high-speed single photon metrology. We focus on the difficulty of GHz data sampling and provide some techniques on how to accomplish it. We also discuss the benefits of field programmable gate arrays as the basis for
This bulletin summarizes the information that was disseminated by the National Institute of Standards and Technology (NIST) in Special Publication (SP) 800-64, Revision 2, Security Considerations in the System Development Life Cycle. This publication was
Supporting seamless handovers between different wireless networks is a challenging issue. One of the most important aspects of a seamless handover is finding a target network and point of attachment (PoA). This is achieved by performing a so-called channel
High-resolution imaging through walls and other materials using microwave signals serves amongst other applications in the rapid detection of human maneuvering, rescue missions in collapsed buildings, and target feature extraction. While narrowband Doppler
This paper suggests that evolutionary models of network infrastructure in market economy can be derived from the underlying selfish behavior of users and providers of network services in the same way as non-equilibrium thermodynamics is derived from the
Two formulae for the central inverse moments of a Quadratic form in normal variables and of the ratio forms are established. They relate the quadratic form determined by a positive definite matrix to that defined by the inverse matrix.
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which currently used public key cryptographic algorithms are based. In this paper
Constantine K. Christakos, Antonio Izquierdo Manzanares, Richard A. Rouil, Nada T. Golmie
We explore the use of the Media Independent Information Service (MIIS) in the IEEE 802.21 Media Independent Handover (MIH) framework to improve handover performance for Fast Mobile IPv6 by providing Authentication information. We explore the tradeoffs of
Michael D. Indovina, Vladimir N. Dvornychenko, Elham Tabassi, George W. Quinn, Patrick J. Grother, Stephen Meagher, Michael D. Garris
The National Institute of Standards and Technology (NIST), with the cooperation of eight technology providers, performed a test of accuracy for searching latent fingerprints when using automatically extracted features and matching (AFEM). This test is
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device s contents is authentication. This paper describes a location-based
Afzal A. Godil, Helin Dutagaci, Xiaolan Li, Petros Daras, Ryutarou Ohbuchi, Takahiko Furuya, Masaki Tezuka, Thibault Napoleon
The annual SHape REtrieval Contest (SHREC) measures the performance of 3D model retrieval methods for several different types of models and retrieval purposes. In this contest the structural shape retrieval track focuses on the retrieval of 3d models which
Helin Dutagaci, Afzal A. Godil, A. Axenopoulos, P. Daras, T. Furuya, R. Ohbuchi
The objective of the SHREC 09 Shape Retrieval Contest of Partial Models is to compare the performances of algorithms that accept a range image as the query and retrieve relevant 3D models from a database. The use of a range scan as the query addresses a
In this paper we present the results of the SHREC 09- Generic Shape Retrieval Contest. The aim of this track was to evaluate the performances of various 3D shape retrieval algorithms on the NIST generic shape benchmark. We hope that the NIST shape
This bulletin summarizes information disseminated in Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard; NIST Special Publication (SP) 800-107, Recommendation for Applications Using Approved Hash Algorithms, by Quynh Dang; SP 800