Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 4076 - 4100 of 7112

The control of quality in a comprehensive mass spectral library

May 30, 1993
Author(s)
Anzor I. Mikaia, S G. Lias, Stephen E. Stein
Computer generated "Quality Index" for the selection of spectra for the inclusion to the NIST/EPA/NIH mass spectral library is abandoned. We have undertaken a program to manually examine all spectra in the database. Suspect spectra are first examined to

IP Security in Structured ASIC: Challenges and Prospects

September 25, 2024
Author(s)
Rasheed Almawzan, Sudipta Paria, Aritra Dasgupta, Kostas Amberiadis, Swarup Bhunia
With the globalization of hardware manufacturing and the growing demand for electronics, companies now heavily rely on offshore facilities for most of the design and manufacturing processes, including emerging technologies like Structured ASICs

IN-PROCESS DATA FUSION FOR PROCESS MONITORING AND CONTROL OF METAL ADDITIVE MANUFACTURING

November 17, 2021
Author(s)
Zhuo Yang, Yan Lu, Simin Li, Jennifer Li, Yande Ndiaye, Hui Yang, Sundar Krishnamurty
To accelerate the adoption of Metal Additive Manufacturing (MAM) for production, an understanding of MAM process-structure-property (PSP) relationships is indispensable for quality control. A multitude of physical phenomena involved in MAM necessitates the

MFC Datasets: Large-Scale Benchmark Datasets for Media Forensic Challenge Evaluation

January 11, 2019
Author(s)
Haiying Guan, Mark Kozak, Eric Robertson, Yooyoung Lee, Amy Yates, Andrew Delgado, Daniel F. Zhou, Timothee N. Kheyrkhah, Jeff Smith, Jonathan G. Fiscus
We provide a benchmark for digital media forensic challenge evaluations. A series of datasets are used to assess the progress and deeply analyze the performance of diverse systems on different media forensic tasks across last two years. The benchmark data

A Multiscale Framework for the Prediction of Concrete Self-Desiccation

March 1, 2018
Author(s)
Madura Pathirage, Dale P. Bentz, Giovanni Di Luzio, Enrico Masoero, Gianluca Cusatis
Cement hydration in concrete and mortar has been studied thoroughly over the past 50 years. To fully understand hydration in concrete and predict the evolution of the hygral, thermal, and mechanical properties at the structural level, one needs to study

Interoperability: linking design and tolerancing with metrology

June 2, 2016
Author(s)
Ed Morse, Saeed Heysiattalab, Allison Barnard Feeney, Thomas D. Hedberg Jr.
On October 30, 2014 the American National Standards Institute (ANSI) approved QIF v 2.0 (Quality Information Framework, version 2.0) as an American National Standard. Subsequently in early 2016 QIF version 2.1 was approved. This paper describes how the QIF

The Multiplicative Complexity of Boolean Functions on Four and Five Variables

March 17, 2015
Author(s)
Meltem Sonmez Turan, Rene C. Peralta
A generic way to design lightweight cryptographic primitives is to construct simple rounds using small nonlinear components such as 4x4 S-boxes and use these iteratively (e.g., PRESENT and SPONGENT). In order to efficiently implement the primitive, optimal

The TREC Medical Records Track

September 25, 2013
Author(s)
Ellen M. Voorhees
The Text REtrieval Conference (TREC) is a series of annual workshops designed to build the infrastructure for large-scale evaluation of search systems and thus improve the state-of-the-art. Each workshop is organized around a set "tracks", challenge

Related-Key Slide Attacks on Block Ciphers with Secret Components

September 18, 2013
Author(s)
Meltem Sonmez Turan
Lightweight cryptography aims to provide sufficient security with low area/power/energy requirements for constrained devices. In this paper, we focus on the lightweight encryption algorithm specified and approved in NRS 009-6-7:2002 by Electricity

Assessing the Effect of Inconsistent Assessors on Summarization Evaluation

June 8, 2012
Author(s)
Karolina K. Owczarzak, Peter Rankel, Hoa T. Dang, John M. Conroy
We investigate the consistency of human assessors involved in summarization evaluation to understand its effect on system ranking and automatic evaluation techniques. Using Text Analysis Conference data, we measure annotator consistency based on human

Speeding up the Wide-Pipe: Secure and Fast Hashing

December 12, 2010
Author(s)
Mridul Nandi, Souradyuti Paul
In this paper we propose a new sequential mode of operation – the Fast wide pipe or FWP for short - to hash messages of arbitrary length. The mode is shown to be (1) preimage-resistance preserving, (2) collision-resistance-preserving and, most importantly

Second Preimage Attacks on Dithered Hash Functions

April 17, 2008
Author(s)
Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John M. Kelsey, Adi Shamir, Sebastien Zimmer
We develop a new generic long-message second preimage attack, based on combining the techniques in the second preimage attacks of Dean Dean99} and Kelsey and Schneier KS05} with the herding attack of Kelsey and Kohno KK06}. We show that these generic

Unsupervised Anomaly Detection System Using Next-Generation Router Architecture

October 1, 2006
Author(s)
Richard A. Rouil, Nicolas Chevrollier, Nada T. Golmie
Unlike many intrusion detection systems that rely mostly on labeled training data, we propose a novel technique for anomaly detection based on unsupervised learning and we apply it to counter denial-of-service attacks. Initial simulation results suggest
Displaying 4076 - 4100 of 7112
Was this page helpful?