Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1226 - 1250 of 1521

mLab: A Mobile Ad Hoc Network Test Bed

July 14, 2005
Author(s)
Tom T. Karygiannis, Emmanouil Antonakakis
Over the last few years, research in the area of mobile ad hoc networks (MANETs) has focused on routing protocol performance improvements, security enhancements, power consumption optimizations, and quality of service metrics. The availability of

Application of Beamforming in Wireless Location Estimation

July 1, 2005
Author(s)
Kamran Sayrafian
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Evaluation of Indoor Localization Techniques

July 1, 2005
Author(s)
Camillo Gentile, Kamran Sayrafian, Nader Moayeri
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Smart Cards and Mobile Device Authentication: an Overview and Implementation

July 1, 2005
Author(s)
Wayne Jansen, Serban I. Gavrila, Clement Seveillac, Vladimir Korolev
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for

NIST's Security Configuration Checklists Program for Technology Products

June 1, 2005
Author(s)
Shirley M. Radack
This bulletin describes the NIST security configuration checklists program and is based on NIST Special Publication 800-70: Security Configuration Checklists Program for IT Products, by Murugiah Souppaya, John Wack and Karen Kent. The bulletin discusses

On the Use of Wireless Network Technologies in Healthcare Environments

June 1, 2005
Author(s)
Nicolas Chevrollier, Nada T. Golmie
In this article, we investigate the suitability of wireless technologies in healthcare/hospital environments. We focus on Wireless Personal Area Network technologies, namely, Bluetooth and the low-rate specifications described in the IEEE 802.15.4 standard

Proximity Beacons and Mobile Device Authentication: an Overview and Implementation

June 1, 2005
Author(s)
Wayne Jansen, Serban I. Gavrila, Vladimir Korolev
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for

RFID 101

June 1, 2005
Author(s)
Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Second Primages on n-bit Hash Functions for Much Less than 2n Work

May 1, 2005
Author(s)
John M. Kelsey, B Schneier
We expand a previous result of Dean[Dea99] to provide a second preimage attack on all n-bit iterated hash functions with Damgard-Merkle strengthening and n-bit intermediate states, allowing a second preimage to be found for a 2k-message-block message with

An Overview and Analysis of PDA Forensic Tools

April 2, 2005
Author(s)
Wayne Jansen, Richard Ayers
Mobile handheld devices are becoming evermore affordable and commonplace in society. When they are involved in a security incident or crime, forensic specialists require tools that allow proper extraction and speedy examination of any digital evidence

Performance Analysis of Exponential Backoff

April 1, 2005
Author(s)
B J. Kwak, N O. Song, Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Real-time Applications for Sensor Networks

April 1, 2005
Author(s)
Hamid Gharavi
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Characterizing the Risks and Costs of BGP Insecurity/Security

March 1, 2005
Author(s)
Douglas Montgomery, Kotikalapudi Sriram, Oliver Borchert, Okhee Kim, D. Richard Kuhn
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal
Displaying 1226 - 1250 of 1521
Was this page helpful?