Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1651 - 1675 of 2269

2003 Information Technology Laboratory (ITL) Technical Accomplishments

January 1, 2004
Author(s)
Elizabeth B. Lennon, Kristi G. Hawes
This report presents the achievements and highlights of NIST's Information Technology Laboratory during FY 2003. Following the Director's Foreword and the ITL overview, technical projects in ITL's research program are described, followed by selected cross

Security Considerations in the Information System Development Life Cycle

December 1, 2003
Author(s)
Shirley M. Radack
The need to provide protection for federal information systems has been present since computers were first used. Including security early in the acquisition process for an information system will usually result in less expensive and more effective security

Guide to Information Technology Security Services

October 13, 2003
Author(s)
Timothy Grance, Joan Hash, Marc Stevens, K O'Neal, N Bartol
Organizations frequently must evaluate and select a variety of information technology (IT) security services in order to maintain and improve their overall IT security program and enterprise architecture. IT security services, which range from security

Guide to Information Technology Security Services

October 9, 2003
Author(s)
Timothy Grance, Joan Hash, Marc Stevens, Kristofor O'Neal, Nadya Bartol
Organizations frequently must evaluate and select a variety of information technology (IT) security services in order to maintain and improve their overall IT security program and enterprise architecture. IT security services, which range from security

Guide to Selecting Information Technology Security Products

October 9, 2003
Author(s)
Timothy Grance, Marc Stevens, Marissa Myers
The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastructure that ensures confidentiality, integrity, and availability of mission critical information. The guide seeks to assist in

Backup Resource Pooling in (M : N) n Fault Recovery Schemes in GMPLS Optical Networks

October 1, 2003
Author(s)
Kotikalapudi Sriram, David W. Griffith, San-Nan K. Lee, Nada T. Golmie
In resilient optical networks, there is a tradeoff between the amount of resources allocated for protection versus the probability that a failed working path cannot be covered, known as protection blocking probability. Often the network topology permits

Building an Information Technology Security Awareness and Training Program

October 1, 2003
Author(s)
Mark Wilson, Joan Hash
NIST Special Publication 800-50, Building An Information Technology Security Awareness and Training Program, provides guidance for building an effective information technology (IT) security program and supports requirements specified in the Federal

A Link-Level Simulator of the CDMA2000 Reverse-Link Layer

August 1, 2003
Author(s)
Hamid Gharavi, R Wyatt-Millington, F Chin, K Ban
This paper presents the design and implementation of a simulation model for the cdma2000 reverse link. The model includes all the radio configurations and their corresponding data rates in accordance with the IS-2000 specifications. The paper first

A Link-Level Simulator of the cdma2000 Reverse-Link Physical Layer

August 1, 2003
Author(s)
Hamid Gharavi, F Chin, K Ban, R Wyatt-Millington
The cdma2000 system is an evolutionary enhancement of the IS-95 standards which support 3G services defined by the International Telecommunications Union(ITU). cdma2000 comes in two phases: 1XRTT and 3XRTT (1X and 3X indicatesthe number of 1.25 MHz wide

Multihop Sensor Network Design for Wideband Communications

August 1, 2003
Author(s)
Hamid Gharavi, K Ban
This paper presents a master/slave cellular based mobile ad-hoc network architecture for multihop multimedia communications. The proposed network is based on a new paradigm for solving the problem of cluster-based ad-hoc routing when utilizing existing

On the Stability of Exponential Backoff

August 1, 2003
Author(s)
N-O Song, B-J Kwak, Leonard E. Miller
New analytical results are given for the stability and performance of the exponential backoff (EB) algorithm. Previous studies on the stability of the (binary) EB have produced contradictory results instead of a consensus: some proved instability, others

Government Smart Card Interoperability Specification, Version 2.1

July 16, 2003
Author(s)
Teresa T. Schwarzhoff, James F. Dray Jr., John P. Wack, Eric Dalci, Alan H. Goldfine, Michaela Iorga
This Government Smart Card Interoperability Specification (GSC-IS) provides solutions to a number of the interoperability challenges associated with smart card technology. The original version of the GSC-IS (version 1.0, August 2000) was developed by the

ASSET: Security Assessment Tool for Federal Agencies

June 1, 2003
Author(s)
Elizabeth B. Lennon
This ITL Bulletin describes the features and capabilities of the Automated Security Self-Evaluation Tool (ASSET), ITL's governmentwide IT security assessment tool. ASSET automates the completion of the security questionnaire in NIST Special Publication 800

Banishing Quasiparticles From Josephson-Junction Qubits: Why and How To Do It

June 1, 2003
Author(s)
Kristine Lang, Sae Woo Nam, Joe Aumentado, John M. Martinis, C Urbina
Current-biased Josephson junctions are prime candidates for the implementation of quantum bits; however, a present limitation is their coherence time. In this paper we qualitatively describe the role of quasiparticles in decoherence. We discuss two methods

Hierarachical Restoration Scheme for Multiple Failures in GMPLS Networks

May 12, 2003
Author(s)
Sanghun Lee, C Kim, David W. Griffith
It is expected that GMPLS-based recovery could become a viable option for obtaining faster restoration than layer 3 rerouting. Even though dedicated restoration ensures restorability of connections, exclusive use of dedicated scheme would result in wasting
Was this page helpful?