Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1451 - 1475 of 2282

Adaptive Channel Scanning for IEEE 802.16e

October 23, 2006
Author(s)
Richard A. Rouil, Nada T. Golmie
In this article we propose an adaptive algorithm that determines the duration and frequency of channel scanning in order to facilitate the discovery of neighboring base stations and handovers across multiple IEEE 802.16 networks. The proposed algorithm

An Ontology of Identity Credentials Part 1: Background and Formulation

October 6, 2006
Author(s)
William I. MacGregor
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation s measurement and standards infrastructure. ITL develops

Programmable Active Services for SIP

October 1, 2006
Author(s)
Jean Deruelle, Mudumbai Ranganathan, Douglas C. Montgomery
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Study of BGP Peering Session Attacks and Their Impacts on Routing Performance

October 1, 2006
Author(s)
Kotikalapudi Sriram, Douglas C. Montgomery, Oliver Borchert, Okhee Kim, David R. Kuhn
We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disruptions. We consider canonical grid as well as down-sampled realistic

Unsupervised Anomaly Detection System Using Next-Generation Router Architecture

October 1, 2006
Author(s)
Richard A. Rouil, Nicolas Chevrollier, Nada T. Golmie
Unlike many intrusion detection systems that rely mostly on labeled training data, we propose a novel technique for anomaly detection based on unsupervised learning and we apply it to counter denial-of-service attacks. Initial simulation results suggest

Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities

September 21, 2006
Author(s)
Timothy Grance, Tamara Nolan, Kristin Burke, Rich Dudley, Gregory White, Travis Good
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist

Guide to Computer Security Log Management

September 13, 2006
Author(s)
Karen A. Scarfone, Murugiah Souppaya
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist

Uncertainty Analysis for Virtual Cement Measurement

September 13, 2006
Author(s)
Blaza Toman, Adriana Hornikova, Robert C. Hagwood, Hung-Kung Liu, Nien F. Zhang, Edward J. Garboczi, Jeffrey W. Bullard
Virtual measurements are the outputs of well-defined mathematical models based on theoretical principles and simulation algorithms. The VCCTL (Virtual Cement and Concrete Testing Laboratory) is a software system built by the Material and Construction

Effective Link Triggers to Improve Handover Performance

September 11, 2006
Author(s)
Steve Woon, Nada T. Golmie, Y. A. Sekercioglu
Effective link layer triggering is key in order to enable fast and reliable handover across different access networks. In this paper, we investigate the use of signal strength as part of the trigger mechanism. We propose an analytical model to estimate the

Guide to Integrating Forensic Techniques into Incident Response

September 1, 2006
Author(s)
Timothy Grance, Suzanne Chevalier, Karen A. Scarfone, Hung Dang
This publication is intended to help organizations in investigating computer security incidents and troubleshooting some information technology (IT) operational problems by providing practical guidance on performing computer and network forensics. The

Guidelines for Media Sanitization

September 1, 2006
Author(s)
Richard L. Kissel, Matthew A. Scholl, Steven Skolochenko, Xiang Li
Information systems capture, process, and store information using a wide variety of media. This information is located not only on the intended storage media but also on devices used to create, process, or transmit this information. These media may require

Investigating Global Behavior in Computing Grids

September 1, 2006
Author(s)
Kevin L. Mills, Christopher E. Dabrowski
This paper presents an executable model of grid computing systems and a measurement approach, based on multidimensional analysis, to understand global behavior in a complex system. Specifically, we investigate effects of spoofing attacks on the scheduling

Multiple Description Video Coding Over Multiple Path Routing Networks

August 29, 2006
Author(s)
Shaoshuai Gao, Hamid Gharavi
This paper presents a multiple description (MD) video-coding scheme, which uses interlaced high signal to noise ratio (H-SNR) and low signal to noise ratio (L-SNR) coded frames to produce two bit-streams. At the decoder, when both bit-streams are received

Demonstration of an Active Quantum Key Distribution Network

August 1, 2006
Author(s)
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Hai Xu, Barry J. Hershman, Joshua Bienfang, David H. Su, Ronald Boisvert, Charles W. Clark, Carl J. Williams
We previously demonstrated a high speed, point to point, quantum key distribution (QKD) system with polariztion coding over a fiber link, in which the resulting cryptographic keys were used for one-time pad encryption of real time video signals. In this

Multiple Description Video Coding over Multiple Path Routing Networks

August 1, 2006
Author(s)
Shaoshuai Gao, Hamid Gharavi
This paper presents a multiple description (MD) video-coding scheme, which uses interlaced high signal to noise ratio (H-SNR) and low signal to noise ratio (L-SNR) coded frames to produce two bit-streams. At the decoder, when both bit-streams are received

Multi-Path Multi-Channel Routing Protocol

July 24, 2006
Author(s)
Hamid Gharavi
In this paper we present a DSR-based multi-path Routing protocol, which has been developed for transmission of Multiple Description Coded (MDC) packets in wireless ad-hoc network environments. The protocol is designed to eliminate co-channel interference

Multi-path Multi-Channel Routing Protocol

July 1, 2006
Author(s)
Bo Yan, Hamid Gharavi
In this paper we present a DSR-based multi-path Routing protocol, which has been developed for transmission of Multiple Description Coded (MDC) packets in wireless ad-hoc network environments. The protocol is designed to eliminate co-channel interference

Quantum Key Distribution System Operating at Sifted-Key Rate over 4 Mbit/s

June 19, 2006
Author(s)
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Hai Xu, Barry J. Hershman, Joshua Bienfang, David H. Su, Ronald Boisvert, Charles W. Clark, Carl J. Williams
A complete fiber-based polarization encoding quantum key distribution (QKD) system based on the BB84 protocol has been developed at National Institute of Standard and Technology (NIST). The system can be operated at a sifted key rate of more than 4 Mbit/s
Was this page helpful?