NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
High-resolution imaging through walls and other materials using microwave signals serves amongst other applications in the rapid detection of human maneuvering, rescue missions in collapsed buildings, and target feature extraction. While narrowband Doppler
This paper suggests that evolutionary models of network infrastructure in market economy can be derived from the underlying selfish behavior of users and providers of network services in the same way as non-equilibrium thermodynamics is derived from the
Two formulae for the central inverse moments of a Quadratic form in normal variables and of the ratio forms are established. They relate the quadratic form determined by a positive definite matrix to that defined by the inverse matrix.
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which currently used public key cryptographic algorithms are based. In this paper
Constantine K. Christakos, Antonio Izquierdo Manzanares, Richard A. Rouil, Nada T. Golmie
We explore the use of the Media Independent Information Service (MIIS) in the IEEE 802.21 Media Independent Handover (MIH) framework to improve handover performance for Fast Mobile IPv6 by providing Authentication information. We explore the tradeoffs of
Michael D. Indovina, Vladimir N. Dvornychenko, Elham Tabassi, George W. Quinn, Patrick J. Grother, Stephen Meagher, Michael D. Garris
The National Institute of Standards and Technology (NIST), with the cooperation of eight technology providers, performed a test of accuracy for searching latent fingerprints when using automatically extracted features and matching (AFEM). This test is
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device s contents is authentication. This paper describes a location-based
Afzal A. Godil, Helin Dutagaci, Xiaolan Li, Petros Daras, Ryutarou Ohbuchi, Takahiko Furuya, Masaki Tezuka, Thibault Napoleon
The annual SHape REtrieval Contest (SHREC) measures the performance of 3D model retrieval methods for several different types of models and retrieval purposes. In this contest the structural shape retrieval track focuses on the retrieval of 3d models which
Helin Dutagaci, Afzal A. Godil, A. Axenopoulos, P. Daras, T. Furuya, R. Ohbuchi
The objective of the SHREC 09 Shape Retrieval Contest of Partial Models is to compare the performances of algorithms that accept a range image as the query and retrieve relevant 3D models from a database. The use of a range scan as the query addresses a
In this paper we present the results of the SHREC 09- Generic Shape Retrieval Contest. The aim of this track was to evaluate the performances of various 3D shape retrieval algorithms on the NIST generic shape benchmark. We hope that the NIST shape
This bulletin summarizes information disseminated in Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard; NIST Special Publication (SP) 800-107, Recommendation for Applications Using Approved Hash Algorithms, by Quynh Dang; SP 800
We have proposed a superseding algorithm approach for image analysis of the pore size distribution (PSD) of porous media. This approach adapts the intrinsic definition of skeletonization for an object representation to the characterization of the PSD, and
This document and NIST Special Publication 800-50, Building an Information Technology Security Awareness and Training Program describe the following key approaches of an information security awareness and training program that federal departments and
David W. Griffith, Richard A. Rouil, Nada T. Golmie
The IEEE 802.21 Media Independent Handover (MIH) working group is developing a set of mechanisms to facilitate migration of mobile users between access networks that use different link-layer technologies. Among these are mobility managers that create and
Static analyzers can report possible problems in code and help reinforce good practices of developers. We contrast the strengths of static analyzers with testing and indicate the current state of the art.
This bulletin summarizes information disseminated in NIST Special Publication (SP) 800-116, A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS), written by William MacGregor of NIST, Ketan Mehta of Mehta, Inc., and
As we approach the end of the fourth decade of the twenty-first century, intelligent agents will handle most of the time-consuming drudge work of usability engineering, freeing usability engineers (UEs) to focus on the mental work of analysis and usability
Common Biometric Exchange Formats Framework (CBEFF) provides a standardized set of definitions and procedures that support the interchange of biometric data in standard data structures called CBEFF biometric information records (BIRs). CBEFF permits
The 2008 Performance Metrics for Intelligent Systems (PerMIS'08) Workshop is the eighth in the series that started in 2000 targeted at defining measures and methodologies of evaluating performance of intelligent systems. PerMIS focused on applications of
SuKyoung Lee, Kotikalapudi Sriram, Kyungsoo Kim, JongHyup Lee, YoonHyuk Kim, Nada T. Golmie
There are currently a large variety of wireless access networks, including the emerging Vehicular Adhoc Networks (VANETs). A large variety of applications utilizing these networks will demand features such as real-time, high-availability and even
This bulletin summarizes the information disseminated in NIST Special Publication (SP) 800-124, Guidelines on Cell Phone and PDA Security: Recommendations of the National Institute of Standards and Technology, which was written by Wayne Jansen and Karen
Kotikalapudi Sriram, Oliver Borchert, Patrick Gleichmann, Douglas C. Montgomery
We present an evaluation methodology for comparison of existing and proposed new algorithms for Border Gateway Protocol (BGP) anomaly detection and robustness. A variety of algorithms and alert tools have been proposed and/or prototyped recently. They
This brochure describes the Information Technology Laboratory (ITL) at NIST, including mission, core competencies, resources, products, and customers. It details ITL's eight programs and concludes with contact information.