Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1326 - 1350 of 2282

Introducing "Insecure IT"

January 20, 2009
Author(s)
David R. Kuhn, Hart Rossman, Simon Liu
This article introduces a new department for IT Professional that will cover security in IT systems, ranging from desktops to global e-commerce networks. Our goal is to offer ideas to improve IT security, both by looking at ways it can go wrong as well as

Slap Fingerprint Segmentation Evaluation II - Procedures and Results

January 12, 2009
Author(s)
Craig I. Watson
In 2004, NIST conducted a fingerprint slap segmentation study [1] to assess the state-of-the-art in fingerprint segmentation technology. Given the development of new technology it has become necessary to reassess the current state-of-the-art of

On The Security Performance of Physical-Layer Network Coding

January 5, 2009
Author(s)
Yi Qian, Kejie Lu, Shengli Fu, Tao Zhang
Physical-layer network coding (PLNC) is a novel wireless communication technology, in which multiple transmitters can send signals on the same channel to the same receiver at the same time. Our previous studies have revealed that PLNC can substantially

Optimization of photon pair generation in dual-element PPKTP waveguide1

January 5, 2009
Author(s)
Xiao Tang, Oliver T. Slattery, Lijun Ma
A compact scheme for high-speed frequency doubling and down-conversion on a single dual-element PPKTP waveguide is investigated. Optimal temperature is achieved and photon pair coincidence is observed at over GHz repetition rate with pulsed pump input

Building Quantum Computers

December 1, 2008
Author(s)
Emanuel H. Knill
In theory, quantum computers can be used to efficiently factor numbers, quadratically speed up many search and optimization problems, and enable currently impossible physics simulations. At first, quantum states appeared to be too fragile for implementing

Overview of the TREC 2007 Question Answering Track

December 1, 2008
Author(s)
Hoa T. Dang, Diane Kelly, Jimmy Lin
The TREC 2007 question answering (QA) track contained two tasks: the main task consisting of series of factoid, list, and ``Other'' questions organized around a set of targets, and the complex, interactive question answering (ciQA) task. The main task

A Novel Topology Control Scheme for Future Wireless Mesh Networks

November 30, 2008
Author(s)
Yi Qian, Kejie Lu, Tao Zhang, Shengli Fu
In this paper, we address the topology control issue for future wireless mesh networks (WMNs) based on the principle of service-oriented design. In particular, we propose a novel topology control scheme that attempts to maximize the overall throughput in

A Secure VANET MAC Protocol for DSRC Applications

November 30, 2008
Author(s)
Yi Qian, Nader Moayeri, Kejie Lu
Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in active safety systems that increase passenger safety by exchanging warning messages

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

November 30, 2008
Author(s)
Michael R. Souryal, Huiqing You
We propose a non-coherent receiver for the fixed detect-and-forward relay channel and derive a closed-form tight upper bound on its bit error probability in Rayleigh fading channels. Using this upper bound, we show that the receiver achieves nearly full

Non-Coherent Amplify-and-Forward Generalized Likelihood Ratio Test Receiver

November 30, 2008
Author(s)
Michael R. Souryal
This paper proposes a simple non-coherent amplify-and-forward receiver for the relay channel and evaluates its diversity performance for Rayleigh fading channels. We use the generalized likelihood ratio test to obtain the decision rule in closed form

Security Challenges in Seamless Mobility - How to ``Handover'' the Keys?

November 30, 2008
Author(s)
Katrin Hoeper, Lidong Chen, Antonio Izquierdo Manzanares, Nada T. Golmie
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on fast access authentication protocols that allow expedited network entry by utilizing existing keying material from previous

Bluetooth Security: Protecting Wireless Networks and Devices

November 20, 2008
Author(s)
Shirley M. Radack
This bulletin summarizes information disseminated in NIST Special Publication (SP) 800-121, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology, which was written by Karen Scarfone of NIST and by John Padgette

Call Admission Control for Mobile Agent Based Handoff in Wireless Mesh Networks

November 17, 2008
Author(s)
Yi Qian, Bo Rong, Kejie Lu, Michel Kadoch
Wireless mesh network (WMN) has emerged recently as a promising technology for next-generation wireless networking. In WMN, it is important to provide an efficient handoff scheme, due to the frequent user mobility. To address this issue, we propose a

Performance Evaluation of a Secure Mac Protocol for Vehicular Networks

November 17, 2008
Author(s)
Yi Qian, Kejie Lu, Nader Moayeri
The main benefit of vehicular communication is seen in active safety systems that increase passenger safety by exchanging warning messages between vehicles. Other applications and private services are also permitted in order to lower the cost and to

Performance of A Novel Topology Control Scheme for Future Wireless Mesh Networks

November 17, 2008
Author(s)
Yi Qian, Kejie Lu, Tao Zhang, Shengli Fu, Ayat Jafari
In this paper, we address the topology control issues for future wireless mesh networks (WMNs). In particular, we propose a novel topology control scheme that attempts to maximize the overall throughput in the network and that takes into account traffic

Using the EAP Framework for Fast Media Independent Handover Authentication

November 17, 2008
Author(s)
Antonio Izquierdo Manzanares, Nada T. Golmie, Katrin Hoeper, Lidong Chen
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover, namely, re-authentication and pre-authentication. We provide a detailed analysis of each mechanism, and

Timely Effective Handover Mechanism in Heterogeneous Wireless Networks

November 13, 2008
Author(s)
Sang J. Yoo, David E. Cypher, Nada T. Golmie
Next-generation wireless networks should be able to coordinate and integrate different communication systems. It has been a challenging problem to support a seamless handover in these diverse wireless network environments. Link level triggers can provide
Was this page helpful?