Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1226 - 1250 of 1523

4th Annual PKI R&D Workshop "Multiple Paths to Trust" Proceedings

August 1, 2005
Author(s)
Clifford Neuman, William Polk, Nelson Hastings
NIST hosted the fourth annual Public Key Infrastructure (PKI) Research Workshop on April 19-21, 2005. The two and a half day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public

Computer Security Division 2004 Annual Report

August 1, 2005
Author(s)
Tanya L. Brewer
This report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2004. It discusses all projects and programs within the Division, staff highlights, and publications. For many

mLab: A Mobile Ad Hoc Network Test Bed

July 14, 2005
Author(s)
Tom T. Karygiannis, Emmanouil Antonakakis
Over the last few years, research in the area of mobile ad hoc networks (MANETs) has focused on routing protocol performance improvements, security enhancements, power consumption optimizations, and quality of service metrics. The availability of

Application of Beamforming in Wireless Location Estimation

July 1, 2005
Author(s)
Kamran Sayrafian
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Evaluation of Indoor Localization Techniques

July 1, 2005
Author(s)
Camillo Gentile, Kamran Sayrafian, Nader Moayeri
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Smart Cards and Mobile Device Authentication: an Overview and Implementation

July 1, 2005
Author(s)
Wayne Jansen, Serban I. Gavrila, Clement Seveillac, Vladimir Korolev
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for

NIST's Security Configuration Checklists Program for Technology Products

June 1, 2005
Author(s)
Shirley M. Radack
This bulletin describes the NIST security configuration checklists program and is based on NIST Special Publication 800-70: Security Configuration Checklists Program for IT Products, by Murugiah Souppaya, John Wack and Karen Kent. The bulletin discusses

On the Use of Wireless Network Technologies in Healthcare Environments

June 1, 2005
Author(s)
Nicolas Chevrollier, Nada T. Golmie
In this article, we investigate the suitability of wireless technologies in healthcare/hospital environments. We focus on Wireless Personal Area Network technologies, namely, Bluetooth and the low-rate specifications described in the IEEE 802.15.4 standard

Proximity Beacons and Mobile Device Authentication: an Overview and Implementation

June 1, 2005
Author(s)
Wayne Jansen, Serban I. Gavrila, Vladimir Korolev
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for

RFID 101

June 1, 2005
Author(s)
Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Second Primages on n-bit Hash Functions for Much Less than 2n Work

May 1, 2005
Author(s)
John M. Kelsey, B Schneier
We expand a previous result of Dean[Dea99] to provide a second preimage attack on all n-bit iterated hash functions with Damgard-Merkle strengthening and n-bit intermediate states, allowing a second preimage to be found for a 2k-message-block message with

An Overview and Analysis of PDA Forensic Tools

April 2, 2005
Author(s)
Wayne Jansen, Richard Ayers
Mobile handheld devices are becoming evermore affordable and commonplace in society. When they are involved in a security incident or crime, forensic specialists require tools that allow proper extraction and speedy examination of any digital evidence

Performance Analysis of Exponential Backoff

April 1, 2005
Author(s)
B J. Kwak, N O. Song, Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
Displaying 1226 - 1250 of 1523
Was this page helpful?