Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1301 - 1325 of 2294

Is Quantum Cryptography Provably Secure?

June 1, 2009
Author(s)
Anastase Nakassis, Joshua C. Bienfang, Paul M. Johnson, Alan Mink, D J. Rogers, Xiao Tang, Carl J. Williams
Quantum cryptography asserts that shared secrets can be established over public channels in such a way that the total information of an eavesdropper can be made arbitrarily small with probability arbitrarily close to 1. As we will show below, the current

Quantum Key Distribution System Operating at Sifted-Key Rate Over 4 Mbit/s 1

June 1, 2009
Author(s)
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Hai Xu, Barry J. Hershman, Joshua C. Bienfang, David H. Su, Ronald F. Boisvert, Charles W. Clark, Carl J. Williams
A complete fiber-based polarization encoding quantum key distribution (QKD) system based on the BB84 protocol has been developed at National Institute of Standard and Technology (NIST). The system can be operated at a sifted key rate of more than 4 Mbit/s

High Speed Quantum Key Distribution over Optical Fiber Network System

May 28, 2009
Author(s)
Xiao Tang, Lijun Ma, Alan Mink
NIST has developed a number of complete fiber-based high-speed quantum key distribution QKD)systems that includes an 850 nm QKD system for a local area network (LAN), a 1310 nm QKD system for a metropolitan area network (MAN), and a 3-node quantum network

Understanding Insecure IT: Practical Risk Assessment

May 27, 2009
Author(s)
Simon Liu, D. Richard Kuhn, Hart Rossman
IT systems have long been at risk from vulnerable software, malicious actions, or inadvertent user errors, in addition to run-of-the-mill natural and human-made disasters. As we discussed in the last issue ( Surviving Insecure IT: Effective Patch

Report of Findings: Use of Language in Ballot Instructions

May 6, 2009
Author(s)
Janice G. Redish, Dana Chisnell, Ethan Newby, Sharon J. Laskowski, Svetlana Z. Lowry
In this study, we compared two ballots that differed only in wording and presentation of the language on the ballots. For Ballot A, we used conventional wording and presentation, taken from typical ballots. For Ballot B, we used plain language wording and

Cut it out!

May 1, 2009
Author(s)
Isabel M. Beichl, Francis Sullivan
This is a tutorial article on a probabilistic method for finding minimum cut sets of a connected graph.

1310 nm Differential Phase Shift QKD System Using Superconducting Single Photon Detectors

April 30, 2009
Author(s)
Xiao Tang, Lijun Ma, Sae Woo Nam, Burm Baek, Oliver T. Slattery, Alan Mink, Hai Xu, Tiejun Chang
We have implemented a differential-phase-shift (DPS) quantum key distribution (QKD) system at 1310 nm with superconducting single photon detectors (SSPD). The timing jitter of the SSPDs is small and its dark counts are very low. 1310 nm is an ideal quantum

Probabilistic Call Admission Control Algorithm for WLAN in a Heterogeneous Wireless Environment

April 30, 2009
Author(s)
Nicolas Chevrollier, David W. Griffith, Nada T. Golmie, SuKyoung Lee, Kyungsoo Kim, Hong Kunho, YoonHyuk Kim
In an integrated WLAN and cellular network, if all mobile users whose connections originate in the cellular network migrate to the WLAN whenever they enter the double coverage area, the WLAN will be severely congested and its users will suffer from

Programmable Instrumentation & GHz Signaling for Quantum Communication Systems

April 30, 2009
Author(s)
Alan Mink, Joshua C. Bienfang, Robert J. Carpenter, Lijun Ma, Barry J. Hershman, Alessandro Restelli, Xiao Tang
We discussed custom instrumentation for high-speed single photon metrology. We focus on the difficulty of GHz data sampling and provide some techniques on how to accomplish it. We also discuss the benefits of field programmable gate arrays as the basis for

The System Development Life Cycle (SDLC)

April 29, 2009
Author(s)
Shirley M. Radack
This bulletin summarizes the information that was disseminated by the National Institute of Standards and Technology (NIST) in Special Publication (SP) 800-64, Revision 2, Security Considerations in the System Development Life Cycle. This publication was

From Network Microeconomics to Network Infrastructure Emergence

April 24, 2009
Author(s)
Vladimir V. Marbukh
This paper suggests that evolutionary models of network infrastructure in market economy can be derived from the underlying selfish behavior of users and providers of network services in the same way as non-equilibrium thermodynamics is derived from the

Identities for Negative Moments of Quadratic Forms in Normal Variables

April 15, 2009
Author(s)
Andrew L. Rukhin
Two formulae for the central inverse moments of a Quadratic form in normal variables and of the ratio forms are established. They relate the quadratic form determined by a positive definite matrix to that defined by the inverse matrix.

Quantum Resistant Public Key Cryptography: A Survey

April 14, 2009
Author(s)
Ray A. Perlner, David A. Cooper
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which currently used public key cryptographic algorithms are based. In this paper

An Evaluation of Automated Latent Fingerprint Identification Technology (Phase II)

April 2, 2009
Author(s)
Michael D. Indovina, Vladimir N. Dvornychenko, Elham Tabassi, George W. Quinn, Patrick J. Grother, Stephen Meagher, Michael D. Garris
The National Institute of Standards and Technology (NIST), with the cooperation of eight technology providers, performed a test of accuracy for searching latent fingerprints when using automatically extracted features and matching (AFEM). This test is

A Location-Based Mechanism for Mobile Device Security

March 31, 2009
Author(s)
Wayne Jansen, Vlad Korolev
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device s contents is authentication. This paper describes a location-based

SHREC 09 Track: Structural Shape Retrieval on Watertight Models

March 29, 2009
Author(s)
Afzal A. Godil, Helin Dutagaci, Xiaolan Li, Petros Daras, Ryutarou Ohbuchi, Takahiko Furuya, Masaki Tezuka, Thibault Napoleon
The annual SHape REtrieval Contest (SHREC) measures the performance of 3D model retrieval methods for several different types of models and retrieval purposes. In this contest the structural shape retrieval track focuses on the retrieval of 3d models which

SHREC 2009 - Shape Retrieval Contest of Partial 3D Models

March 29, 2009
Author(s)
Helin Dutagaci, Afzal A. Godil, A. Axenopoulos, P. Daras, T. Furuya, R. Ohbuchi
The objective of the SHREC 09 Shape Retrieval Contest of Partial Models is to compare the performances of algorithms that accept a range image as the query and retrieve relevant 3D models from a database. The use of a range scan as the query addresses a

SHREC'09 Track: Generic Shape Retrieval

March 29, 2009
Author(s)
Afzal A. Godil, Helin Dutagaci
In this paper we present the results of the SHREC 09- Generic Shape Retrieval Contest. The aim of this track was to evaluate the performances of various 3D shape retrieval algorithms on the NIST generic shape benchmark. We hope that the NIST shape
Was this page helpful?