Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 626 - 650 of 2294

Measuring the Usability and Security of Permuted Passwords on Mobile Platforms

April 25, 2016
Author(s)
Kristen K. Greene, John M. Kelsey, Joshua M. Franklin
Password entry on mobile devices significantly impacts both usability and security, but there is a lack of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength metrics

Guidelines for the Creation of Interoperable Software Identification (SWID) Tags

April 22, 2016
Author(s)
David A. Waltermire, Brant Cheikes, Larry Feldman, Gregory A. Witte
This report provides an overview of the capabilities and usage of software identification (SWID) tags as part of a comprehensive software lifecycle. As instantiated in the International Organization for Standardization/International Electrotechnical

Public Safety Analytics R&D Roadmap

April 19, 2016
Author(s)
Tracy A. McElvaney, Ryan Felts, Marc Leh
The public safety community is in a period of great transition. Over the next 20 years, technology advancements will increase accessibility of data/video applications to public safety, and allow for the eventual migration of voice communications from

New NIST Security Standard Can Protect Credit Cards, Health Information

April 14, 2016
Author(s)
Morris J. Dworkin, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-38G, "Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption." The publication specifies two methods for format-preserving

JPEG 2000 CODEC Certification Guidance for 1000 ppi Fingerprint Friction Ridge Imagery

April 13, 2016
Author(s)
John M. Libert, Shahram Orandi, Michael D. Garris, Frederick R. Byers, John D. Grantham
The document describes the procedure by which applications of JPEG 2000 CODECs will be evaluated with respect to conformance to the NIST guidance for compression of 1000 ppi friction ridge images as detailed in NIST Special Publication 500-289 [NIST5]

The Need for Realism when Simulating Network Congestion

April 2, 2016
Author(s)
Kevin L. Mills, Christopher E. Dabrowski
Many researchers use simulation to investigate network congestion, often finding congestion spread can be modeled as percolation, spreading slowly under increasing load until a critical point, then spreading quickly through the network. The researchers

Analysis of Virtual Networking Options for Securing Virtual Machines

March 20, 2016
Author(s)
Ramaswamy Chandramouli
Virtual Machines (VMs) constitute the primary category of resources to be protected in virtualized infrastructures. Out of the two types of protection for VMs -- Host-level and Network-level -- it is the approaches for the Network-level protection that are

Updates to the NIST SCAP Validation Program and Associated Test Requirements

March 15, 2016
Author(s)
Melanie Cook, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NISTIR 7511, Rev. 4, "Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements". This is the fourth revision of the NISTIR which defines the requirements and

Linear Time Vertex Partitioning on Massive Graphs

March 7, 2016
Author(s)
Peter M. Mell, Richard Harang, Assane Gueye
The problem of optimally removing a set of vertices from a graph to minimize the size of the largest resultant component is known to be NP-complete. Prior work has provided near optimal heuristics with a high time complexity that function on up to hundreds

Secure Virtual Network Configuration for Virtual Machine (VM) Protection

March 7, 2016
Author(s)
Ramaswamy Chandramouli
Virtual Machines (VMs) are key resources to be protected since they are the compute engines hosting mission-critical applications. Since VMs are end-nodes of a virtual network, the configuration of the virtual network forms an important element in the

3D Segmentation of Stem Cells from Thousands of Confocal Microscopy Images

March 1, 2016
Author(s)
Peter Bajcsy, Mylene H. Simon, Stephen J. Florczyk, Carl G. Simon Jr., Derek Juba, Mary C. Brady
We address the problem of estimating 3D segmentation performance when segmentation is applied to thousands of confocal microscopy images (z-stacks) of cells. With a very large number of z-stacks, manual inputs to validate each segmentation result are

Learning Internet of Things Security "Hands-on"

February 3, 2016
Author(s)
Constantinos Kolias, Angelos Stavrou, Jeff Voas, Irena Bojanova, D. Richard Kuhn
Our research began from asking whether there is a science behind the Internet of Things (IoT). We started from zero knowledge and no bias. The results of that work determined that indeed there is a science, but it is a science of numerous actors, that when

Kinetic-Based Micro Energy-Harvesting for Wearable Sensors

January 28, 2016
Author(s)
Kamran Sayrafian, Dora Budic, Dina Simunic
Wearable sensors are considered to be a key component of cognitive infocommunications systems. These sensors, which are basically enabler of inter-cognitive communication, will provide physical interfaces between humans and future information and

A Rational Foundation for Software Metrology

January 20, 2016
Author(s)
David W. Flater, Paul E. Black, Elizabeth N. Fong, Raghu N. Kacker, Vadim Okun, Stephen S. Wood, David R. Kuhn
Much software research and practice involves ostensible measurements of software, yet little progress has been made on an SI-like metrological foundation for those measurements since the work of Gray, Hogan, et al. in 1996-2001. Given a physical object

A metamodel for optimization problems

January 8, 2016
Author(s)
Ibrahim Assouroko, Peter O. Denno
In mathematics, computer science, and operations research, mathematical optimization is the process of finding best feasible values (oftentimes maxima or minima) of a given objective that is modeled mathematically. This paper introduces the concept of a

Survey Statistics of Automated Segmentations Applied to Optical Imaging of Mammalian Cells

January 8, 2016
Author(s)
Peter Bajcsy, Antonio Cardone, Joe Chalfoun, Michael W. Halter, Derek Juba, Marcin Kociolek, Michael P. Majurski, Adele P. Peskin, Carl G. Simon Jr., Mylene H. Simon, Antoine Vandecreme, Anne L. Plant, Mary C. Brady
The goal of this survey paper is to overview cellular measurements using optical microscopy imaging followed by automated image segmentation. The cellular measurements of primary interest are taken from mammalian cells and their components. They are

The Influence of Realism on Congestion in Network Simulations

January 8, 2016
Author(s)
Kevin L. Mills, Christopher E. Dabrowski
Many researchers have used simulation to investigate the spread of congestion in networks. These researchers often find that congestion can be modeled as a percolation process, spreading slowly under increasing load until a critical point. After the

An Effective Video Synopsis Approach with Seam Carving

January 1, 2016
Author(s)
Hamid Gharavi
With a growth of surveillance cameras, the amount of captured videos expands. Manually analyzing and retrieving surveillance video is labor intensive and expensive. It would be much more convenient to generate a video digest, with which we can view the

Third-Party Software's Trust Quagmire

December 18, 2015
Author(s)
Jeffrey M. Voas, George Hurlburt
Integrating software developed by third-party organizations into a larger system raises concerns about the software's quality, origin, functionality, security, and interoperability. Addressing these concerns requires rethinking the roles of software's
Displaying 626 - 650 of 2294
Was this page helpful?