Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 626 - 650 of 4390

2018 MediFor Challenge

July 23, 2019
Author(s)
Jonathan G. Fiscus, Haiying Guan, Andrew Delgado, Timothee N. Kheyrkhah, Yooyoung Lee, Daniel F. Zhou, Amy Yates
Media forensics is the science and practice of determining the authenticity and establishing the integrity of audio and visual media. DARPA's Media Forensics (MediFor) program brings together world-class researchers to develop technologies for the

Information Exposure (IEX): A New Class in the Bugs Framework (BF)

July 9, 2019
Author(s)
Irena Bojanova, Yaacov Yesha, Paul E. Black, Yan Wu
Exposure of sensitive information can be harmful on its own and in addition could enable further attacks. A rigorous and unambiguous definition of information exposure faults can help researchers and practitioners identify them, thus avoiding security

Manipulation Data Collection and Annotation Tool for Media Forensics

June 17, 2019
Author(s)
Eric Robertson, Haiying Guan, Mark Kozak, Yooyoung Lee, Amy Yates, Andrew Delgado, Daniel F. Zhou, Timothee N. Kheyrkhah, Jeff Smith, Jonathan G. Fiscus
With the increasing diversity and complexity of media forensics techniques, the evaluation of state-of-the-art detectors are impeded by lacking the metadata and manipulation history ground-truth. This paper presents a novel image/video manipulation

FIPS 140-3 Adopts ISO/IEC Standards

May 20, 2019
Author(s)
Kim B. Schaffer
This bulletin summarizes the information found in FIPS 140-3: Security Requirements for Cryptographic Modules which is applicable to all federal agencies that use cryptographic-based security systems to provide adequate information security for all agency

Post-Quantum Cryptography and 5G Security: Tutorial

May 15, 2019
Author(s)
T. Charles Clancy, Robert W. McGwier, Lidong Chen
The Fifth Generation (5G) mobile broadband standards make a fundamental shift in cryptography. Prior generations based their security and privacy principally on symmetric key cryptography. The Subscriber Identity Module (SIM) and its successors contain a

Vetting the Security of Mobile Applications

April 19, 2019
Author(s)
Michael Ogata, Josh Franklin, Jeff Voas, Vincent Sritapan, Stephen Quirolgico
Mobile applications are an integral part of our everyday personal and professional lives. As both public and private organizations rely more on mobile applications, ensuring that they are reasonably free from vulnerabilities and defects becomes paramount

Browser Fingerprinting using Combinatorial Sequence Testing

April 1, 2019
Author(s)
Bernhard Garn, Dimitris Simos, Stefan Zimmer, D. Richard Kuhn, Raghu N. Kacker
In this paper, we propose an approach for browser fingerprinting using their behavior during the TLS 1.2 handshake with a server. Using combinatorial methods, we created test sets consisting of TLS server-side messages as sequences that are sent to the

Voices of First Responders – Examining Public Safety Communication Problems and Requested Functionality: Findings from User-Centered Interviews, Phase 1, Volume 2

March 28, 2019
Author(s)
Shanee T. Dawkins, Yee-Yin Choong, Mary F. Theofanos, Kristen Greene, Susanne M. Furman, Michelle P. Steves, Sandra S. Prettyman
The public safety community has a unique opportunity to improve communication technology for incident response with the creation of the national public safety broadband network (NPSBN). Understanding the problems currently being experienced by first

Security Requirements for Cryptographic Modules

March 22, 2019
Author(s)
National Institute of Standards and Technology (NIST), Michael J. Cooper, Kim B. Schaffer
The selective application of technological and related procedural safeguards is an important responsibility of every federal organization in providing adequate security in its computer and telecommunication systems. This standard is applicable to all

Rethinking Distributed Ledger Technology

March 20, 2019
Author(s)
David R. Kuhn, Dylan J. Yaga, Jeffrey M. Voas
Blockchains were designed to solve the problem of double-spending in cryptocurrencies, and the success of the Bitcoin design has generated vastly more interest than previous proposals for digital currencies. Blockchains are being used in other areas as

A data science challenge for converting airborne remote sensing data into ecological information

February 28, 2019
Author(s)
Sergio Marconi, Sarah J. Graves, Dihong Gong, Shahriari Nia Morteza, Marion Le Bras, Bonnie J. Dorr, Peter Fontana, Justin Gearhart, Craig Greenberg, Dave J. Harris, Sugumar A. Kumar, Agarwal Nishant, Joshi Prarabdh, Sandeep U. Rege, Stephanie A. Bohlman, Ethan P. White, Daisy Z. Wang
In recent years ecology has reached the point where a data science competition could be very productive. Large amounts of open data are increasingly available and areas of shared interest around which to center competitions are increasingly prominent. The
Displaying 626 - 650 of 4390
Was this page helpful?