Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1601 - 1625 of 2269

Update on the Down Selection Process, IEEE 802.21-05-200-01

January 1, 2005
Author(s)
Nada T. Golmie
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Voting Issues Discussion, IEEE 802.21-05-217-01

January 1, 2005
Author(s)
Nada T. Golmie
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Link Scoped IPv6 Multicast

December 1, 2004
Author(s)
M K. Shin
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Rich Transcription Website

December 1, 2004
Author(s)
John S. Garofolo
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint

Ad-hoc Network Systems and Applications

November 1, 2004
Author(s)
Hamid Gharavi
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Attack vs. Countermeasure Effectiveness (ACE): Modeling Tool for BGP

November 1, 2004
Author(s)
Kotikalapudi Sriram, Douglas Montgomery, D. Richard Kuhn
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

Incorporating Subjective Risk Vales in BGP Attack Trees

November 1, 2004
Author(s)
D. Richard Kuhn, Kotikalapudi Sriram, Douglas Montgomery
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

Interference Simulation Modeling, IEEE 802.19-04-37-00

November 1, 2004
Author(s)
Nada T. Golmie
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Performance Evaluation of Low Rate WPANs for Sensors and Medical Applications

November 1, 2004
Author(s)
Nada T. Golmie, David E. Cypher, O Rebala
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

Toward a Formal Common Information Model Ontology

November 1, 2004
Author(s)
Stephen Quirolgico, P Assis, A Westerinen, M Baskey, E Stokes
Self-managing systems will be highly dependent upon information acquired from disparate applications, devices, components and subsystems. To be effectively managed, such information will need to conform to a common model. One standard that provides a

Toward a Formal Common Information Model Ontology

November 1, 2004
Author(s)
Stephen Quirolgico, P Assis, A Westerinen, M Baskey, E Stokes
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

Guide to Public Safety Applications of Wireless Technology

October 1, 2004
Author(s)
Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Resource Planning and Bandwidth Allocation in Hybrid Fiber-Coax Residential Networks

October 1, 2004
Author(s)
David W. Griffith, Kotikalapudi Sriram, L Krivulina, Nada T. Golmie
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Securely Connecting the World with Cyber Security Standards

October 1, 2004
Author(s)
Alicia Clay Jones, Michael Hogan
This paper focuses on some of the key roles that cyber security standards play in securely connecting our cyber world. Cyber security standards can be categorized as technical, management, or testing standards. All three types of standards are necessary to

Information Security in the System Development Life Cycle

September 1, 2004
Author(s)
Annabelle Lee, Tanya L. Brewer
Many system development life cycle (SDLC) models exist that can be used by an organization to effectively develop an information system. Security should be incorporated into all phases, from initiation to disposition, of an SDLC model. This Bulletin lays

Rate Adaptive Video Transmission Over Ad-Hoc Networks

September 1, 2004
Author(s)
Hamid Gharavi, K Ban
In mobile ad-hoc network environments where the network topology is expected to change considerably, providing reliable video communications is a challenging task. This paper is mainly concerned with developing a packet control mechanism to reduce bursts
Was this page helpful?