NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
https://www.nist.gov/publications/search
Search Publications
NIST Authors in Bold
Displaying 1251 - 1275 of 2282
To create effective and accurate two-way, free form, spoken language translation devices, they must be supplied with appropriate training data. The goal of the DARPA TRANSTAC (Spoken Language Communication and Translation System for Tactical Use) program
[Superseded by NISTIR 7621 Rev. 1 (November 2016): https://www.nist.gov/node/1111801 ] For some small businesses, the security of their information, systems, and networks might not be a high priority, but for their customers, employees, and trading
This report contains a list of selected acronyms and abbreviations for system and network security terms with their generally accepted or preferred definitions. It is intended as a resource for Federal agencies and other users of system and network
Craig I. Schlenoff, Brian A. Weiss, Michelle P. Steves, Gregory A. Sanders, Frederick M. Proctor, Ann M. Virts
The Spoken Language Communication and Translation System for Tactical Use (TRANSTAC) program is a Defense Advanced Research Projects Agency (DARPA) advanced technology research and development program. The goal of the TRANSTAC program is to demonstrate
Deepak Sharma, Dhananjay Anand, Ya-Shian Li-Baboud, James Moyne
Shrinking process tolerances due to decreasing device sizes and increasing chip complexity in semiconductor manufacturing are motivating efforts to improve methods for real-time networked process control. Prior work shows that the lack of precise time
Achieving next-generation factory (NGF) goals has been an industry challenge for APC applications to acquire a sufficient level of data quality to maximize the benefits of automation. For example, it is difficult to get accurate timestamps because sensor
This bulletin summarizes the information in Federal Information Processing Standard (FIPS) Publication 186-3, Digital Signature Standard (DSS). Approved in June 2009 by the Secretary of Commerce for use by federal government agencies in protecting the
Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless the
Luisa Bentivogli, Ido Dagan, Hoa T. Dang, Danilo Giampiccolo, Medea L. Leggio, Bernardo Magnini
In the 2009 Recognizing Textual Entailment (RTE) challenge, a Search Pilot task has been introduced, aimed at finding all the sentences in a corpus which entail a set of given hypotheses. The preparation of the data set for this task has provided an
This Recommendation specifies security requirements for authentication methods with key establishment supported by the Extensible Authentication Protocol (EAP) defined in IETF RFC 3748 for wireless access authentications to federal networks.
Kamran Sayrafian, Wen-Bin Yang, John G. Hagedorn, Judith E. Terrill, Kamya Yazdandoost
Knowledge of the propagation media is a key step toward a successful transceiver design. Such information is typically gathered by conducting physical experiments, measuring and processing the corresponding data to obtain channel characteristics. In case
With the proliferation of computers to process, store, and transfer information, manufacturers are suffering increasing costs due to information incompatibilities. The information incompatibility problem in manufacturing quality is costly to everyone
Xiao Tang, Lijun Ma, Oliver T. Slattery, Tiejun Chang
We have experimentally implemented a non-degenerate sequential time-bin entangled photon-pair source using a periodically poled potassium titanyl phosphate (PPKTP) waveguide at a clock rate of 1 GHz. The wavelengths of the signal and idler are 895 and 1310
We developed low-noise up-conversion single photon detectors for 1310 nm based on a periodically-poled LiNbO3 (PPLN) waveguide. The low-noise feature is achieved by using a pulsed optical pump at a wavelength longer than the signal wavelength. The
This bulletin summarizes the information presented in NIST Special Publication 800-53, Revision 3, Recommended Security Controls for Federal Information Systems and Organizations, on the catalog of security controls for information systems. These best
Three dimensional shape retrieval is a fairly new concept being studied all over the world. It is notable and essential because it can be applied to multiple disciplines in society, including: computer vision, CAD models, computer graphics, molecular
Image validation and verification are important functions in the acquisition of fingerprint images from live-scan devices and for assessing and maintaining the fidelity of fingerprint image databases. In addition to law enforcement, such databases are used
The NIST DMIS Test Suite, version 2.1.5, is described. The test suite is intended to serve two purposes, 1) to help users and vendors use version 5.1 of DMIS (the Dimensional Measuring Interface Standard) and 2) to provide utilities and test files for
In this paper, we study a wide class of single-keyed domain extension algorithms, called generalized domain extension (\tx{GDE}), extending a keyed function $F_K : {0,1}^b \to {0,1}^n$ to a keyed function $\overline{F}_K : {0,1}^* \to {0,1}^n$, $K \in {0,1
This paper provides an improved security analysis of popular pseudorandom functions (PRF) based on an $n$-bit pseudorandom permutation (PRP). In CRYPTO-05, an improved security analysis of \tx{CBC} (with prefix-free message space) was shown. The similar
Hildegard Ferraiolo, Teresa T. Schwarzhoff, William I. MacGregor, Hung Dang, Ketan Mehta
This document describes the use of ISO/IEC 24727 in enabling client-applications to access identity credentials issued by different credential issuers.
Antonio Izquierdo Manzanares, Nada T. Golmie, Richard A. Rouil
In this paper we study the performance of the authentication process in media independent handovers, and consider the impact of using IEEE 802.21 link triggers to achieve seamless mobility. We describe all interactions between the 802.21 services and the
We developed an up-conversion spectrometer for signals at single photon levels near the infrared region based on a tunable up-conversion detector which uses a periodically poled lithium niobate (PPLN) waveguide as the conversion medium. We also