NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal
Stephen Quirolgico, P Assis, A Westerinen, M Baskey, E Stokes
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal
Stephen Quirolgico, P Assis, A Westerinen, M Baskey, E Stokes
Self-managing systems will be highly dependent upon information acquired from disparate applications, devices, components and subsystems. To be effectively managed, such information will need to conform to a common model. One standard that provides a
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
David W. Griffith, Kotikalapudi Sriram, L Krivulina, Nada T. Golmie
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
This paper focuses on some of the key roles that cyber security standards play in securely connecting our cyber world. Cyber security standards can be categorized as technical, management, or testing standards. All three types of standards are necessary to
We consider the effect of competition between N greedy autonomous systems (ASs) on pricing and availability ofInternet services to elastic users. The problem is formalized as a non-cooperative game, where the autonomous systems attempt to maximize their
Many system development life cycle (SDLC) models exist that can be used by an organization to effectively develop an information system. Security should be incorporated into all phases, from initiation to disposition, of an SDLC model. This Bulletin lays
In mobile ad-hoc network environments where the network topology is expected to change considerably, providing reliable video communications is a challenging task. This paper is mainly concerned with developing a packet control mechanism to reduce bursts
The Engineering Principles for Information Technology (IT) Security (EP-ITS) presents a list of system-level security principles to be considered in the design, development, and operation of an information system. This document is to be used by IT security
Exhaustive testing of computer software is intractable, but empirical studies of software failures suggest that testing can in some cases be effectively exhaustive. Data reported in this study and others show that software failures in a variety of domains
Since typically network performance is characterized by multiple competing criteria, the network management requires resolving the corresponding trade-offs. The problems include finding the Pareto optimal frontier in space of these criteria and selecting
This ITL Bulletin summarizes the contents of NIST Special Publication (SP) 800-35, Guide to Information Technology Security Services, Recommendations of the National Institute of Standards and Technology. SP 800-35 provides guidance to help organizations
Sharon J. Laskowski, James H. Yen, Marguerite W. Autry, J Cuginin, William H. Killam
The goal of this report is to describe how research and best practices from the human factors, human-machine and human-computer interaction, and usability engineering disciplines can be brought to bear to improve the usability and accessibility of voting