Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 601 - 625 of 644

Guide to Storage Encryption Technologies for End User Devices

November 15, 2007
Author(s)
Karen A. Scarfone, Murugiah P. Souppaya, Matt Sexton
Many threats against end user devices, such as desktop and laptop computers, smart phones, personal digital assistants, and removable media, could cause information stored on the devices to be accessed by unauthorized parties. To prevent such disclosures

Nanosecond Delay With Subpicosecond Uncertainty

September 1, 2007
Author(s)
Donald R. Larson, Nicholas Paulter
We have combined a commercially available, variable length coaxial delay line (trombone line) with a high resolution linear translation system. The result is better resolution and lower uncertainty in the achievable delays than previously available. The

Real-Time Deployment of Multihop Relays for Range Extension

June 11, 2007
Author(s)
Michael R. Souryal, Johannes Geissbuehler, Leonard E. Miller, Nader Moayeri
When the range of single-hop wireless communication is limited by distance or harsh radio propagation conditions, relays can be used to extend the communication range through multihop relaying. This paper targets the need in certain scenarios for rapid

Securing Radio Frequency Identification (RFID) Systems

May 17, 2007
Author(s)
Karen A. Scarfone
Radio frequency identification (RFID) is a form of automatic identification and data capture technology that uses electric or magnetic fields at radio frequencies to transmit information. An RFID system can be used to identify many types of objects, such

Cell Phone Forensic Tools: An Overview and Analysis Update

March 21, 2007
Author(s)
Richard Ayers, Wayne Jansen, Aurelien M. Delaitre, Ludovic Moenner
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., Personal Digital Assistant (PDA) phones) are ubiquitous. Rather than just placing calls, certain phones allow users to perform additional tasks such as SMS (Short Message

Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i

February 7, 2007
Author(s)
Sheila E. Frankel, Bernard Eydt, L Owens, Karen Kent Scarfone
This report provides readers with a detailed explanation of next generation 802.11 wireless security. It describes the inherently flawed Wired Equivalent Privacy (WEP) and explains 802.11i's two-step approach (interim and long-term)to providing effective

A Measurement of Propagation Delay

January 16, 2007
Author(s)
Donald R. Larson, Nicholas Paulter
A measurement method and associated uncertainty analysis have been developed for the measurement of propagation or group delay in electrical transmission lines and optical fibers. The measurement method and uncertainty analysis were applied to measurements

Eliminating FFT Artifacts in Vector Signal Analyzer Spectra

October 1, 2006
Author(s)
Michael McKinley, Kate Remley, M. Myslinski, J. S. Kenney
We present a method to minimize spectral leakage in measurements of periodic signals made with the vector signal analyzer (VSA) by taking into account the periodic nature of the Fast Fourier Transform (FFT). This method negates the need for filtering the

Link Assessment in an Indoor 802.11 Network

April 1, 2006
Author(s)
Michael R. Souryal, Luke Klein-Berndt, Leonard E. Miller, Nader Moayeri
This paper presents the empirical results and analysis of a link variability study for an indoor, stationary 802.11 network subject to external interference. The objective is to characterize the relationships between the packet loss rate on a link and the

A Measurement-Based Multisine Design Procedure

January 1, 2006
Author(s)
M. Myslinski, Kate Remley, Michael McKinley, Dominique Schreurs, Bart Nauwelaers
This work presents a procedure to design a multisine with probability density function (PDF) similar to that of a measured realistic digitally modulated signal. We discuss important practical issues crucial to the successful multisine construction and

Joint Rate Adaptation and Channel-Adaptive Relaying in 802.11 Ad Hoc Networks

January 1, 2006
Author(s)
Michael R. Souryal, Nader Moayeri
Channel-adaptive relaying has recently been proposed as a means to exploit spatial and temporal diversity in multihop ad hoc networks with fading. In conjunction with appropriate routing protocols, adaptive relaying enables each forwarding node in a

Channel-Adaptive Relaying in Mobile Ad Hoc Networks with Fading

October 1, 2005
Author(s)
Michael R. Souryal, Nader Moayeri
This paper describes an approach for relaying in multihop networks that adapts to the time-varying channel and exploits spatial diversity to mitigate multipath fading. Ignored in some simulation-based performance analyses, fading arises from multipath

Soft Decision Metrics for Turbo-Coded FH M-FSK Ad Hoc Packet Radio Networks

October 1, 2005
Author(s)
B M. Peric, Michael R. Souryal, E G. Larsson, B R. Vojcic
This paper addresses turbo-coded non-coherent FH M-FSK ad hoc networks with a Poisson distribution of interferers where multiple access interference can be modeled as symmetric a-stable (SaS) noise and a is inversely proportional to the path loss exponent

Security Considerations for Voice Over IP Systems

January 1, 2005
Author(s)
David R. Kuhn, Thomas J. Walsh, S G. Fries
Voice over Internet Protocol (VOIP) refers to the transmission of speech across data-style networks. This form of transmission is conceptually superior to conventional circuit switched communication in many ways. However, a plethora of security issues are

Securing Voice Over Internet Protocol (IP) Networks

October 1, 2004
Author(s)
Thomas J. Walsh, David R. Kuhn
Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibility are

Pulse Parameter Dependence on Transition Position and Epoch Duration

May 18, 2004
Author(s)
Donald R. Larson, Nicholas Paulter, David I. Bergman
The pulse parameters of amplitudes and transition duration (10% to 90%) are examined as a function of the epoch and position of the transition edge in the epoch. The primary explanations for the observed variations are the pulse aberrations and the finite

IEEE 1451 Smart Wireless Machinery Monitoring and Control for Naval Vessels

July 1, 2003
Author(s)
T Brooks, S Chen, Kang B. Lee
The IEEE 1451 family of standards makes it easy to create solutions using existing networking technologies, standardized connections to smart devices, and a common software architecture. The standards allow the choice of application software, field network

Security for Wireless Networks and Devices

March 27, 2003
Author(s)
Shirley M. Radack
This ITL Bulletin summarizes NIST Special Publication (SP) 800-48, Wireless Network Security, 802.11, Bluetooth, and Handheld Devices. Written by Tom Karygiannis and Les Owens. NIST SP 800-48 provides recommendations to improve the security of wireless
Displaying 601 - 625 of 644
Was this page helpful?