Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1876 - 1900 of 2294

Adapting to Bandwidth Variations in Wide-Area Data Combination

May 26, 1998
Author(s)
Mudumbai Ranganathan, A Acharya, J Saltz
Efficient data combination over wide-area networks is hard as wide-area networks have large variations in available network bandwidth. In this paper, we examine the utility of changing the location of combination operators as a technique to adapt to

Replicated Architecture for Application Sharing in Desktop Conferencing Systems

May 26, 1998
Author(s)
J B. West, P Kabore, Okhee Kim, J Favreau
Multimedia desktop conferencing systems are gaining momentum and increasingly becoming a reality. In these systems, besides using audio, video and multi-user applications like a white board, users can share a vast number of single-user applications for

A Federal Public Key Infrastructure With Multiple Digital Signature Algorithms

April 22, 1998
Author(s)
William E. Burr, William T. Polk
Several digital algorithms are coming into general use. A certificate containing a key for one algorithm can be signed with a different algorithm. This paper discusses the interoperability issues where different digital signature algorithms are used in one

Network Security Testing Using Mobile Agents

March 25, 1998
Author(s)
Athanasios T. Karygiannis
This paper describes a prototype security testing tool that is currently under development at NIST. This prototype tool uses autonomous mobile agents to perform distributed, fault-tolerant, and adaptive network security testing. The security testing

Information Security and the World Wide Web (WWW)

February 12, 1998
Author(s)
Shirley M. Radack
This bulletin discusses some of the vulnerabilities and threats to information security that organizations may experience in their use of the Internet and the World Wide Web (WWW). Both Web server and Web browser software can introduce vulnerabilities
Was this page helpful?