Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1251 - 1275 of 2846

The Importance of Entropy to Information Security

February 3, 2014
Author(s)
Apostol T. Vassilev, Timothy Hall
The strength of cryptographic keys is an active challenge in academic research and industrial practice. In this paper we discuss the entropy as fundamentally important concept for generating hard-to-guess, i.e., strong, cryptographic keys and outline the

Optimal Spread in Network Consensus Models

January 27, 2014
Author(s)
Fern Y. Hunt
Suppose we seek a set of nodes in a network that will enable the fastest spread of information in a decentralized communication environment. If communication resources are limited there are constraints on the number of nodes that can be selected. In this

IREX IV: Part 2 Compression Profiles for Iris Image Compression

January 23, 2014
Author(s)
George Quinn, Patrick Grother, Mei Ngan, Nick Rymer
The IREX IV evaluation builds upon IREX III as a performance test of one-to-many iris recognition. This report is the second part of the IREX IV evaluation, which specifically, evaluates the ability of automated iris recognition algorithms to match heavily

Building one-time memories from isolated qubits

January 14, 2014
Author(s)
Yi-Kai Liu
One-time memories (OTM's) are a simple type of tamper-resistant cryptographic hardware, that can be used to implement many forms of secure computation, such as one-time programs. Here we investigate the possibility of building OTM's using "isolated qubits"

A Profile of the Key Management Framework for the Federal Government

January 9, 2014
Author(s)
Elaine B. Barker
The Computer Security Division within ITL has recently provided a draft of Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. NIST SP 800-152 is based on NIST SP 800-130, A Framework for

A New Standard for Securing Media-Independent Handover: IEEE 802.21a

December 31, 2013
Author(s)
Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE 802

The National Vulnerability Database (NVD): Overview

December 18, 2013
Author(s)
Harold Booth, Doug Rike, Gregory A. Witte
The National Vulnerability Database (NVD), and its companion, the National Checklist Program (NCP), have provided a valuable and flexible set of services to users around the world since NVD was established in 2005. The NVD was established to provide a U.S
Displaying 1251 - 1275 of 2846
Was this page helpful?