Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1251 - 1275 of 2282

System and Network Security Acronyms and Abbreviations

September 30, 2009
Author(s)
Karen A. Scarfone, Victoria Thompson
This report contains a list of selected acronyms and abbreviations for system and network security terms with their generally accepted or preferred definitions. It is intended as a resource for Federal agencies and other users of system and network

Evaluating Speech Translation Systems: Applying SCORE to TRANSTAC Technologies

September 29, 2009
Author(s)
Craig I. Schlenoff, Brian A. Weiss, Michelle P. Steves, Gregory A. Sanders, Frederick M. Proctor, Ann M. Virts
The Spoken Language Communication and Translation System for Tactical Use (TRANSTAC) program is a Defense Advanced Research Projects Agency (DARPA) advanced technology research and development program. The goal of the TRANSTAC program is to demonstrate

Improving Data Quality in Embedded Sensor Systems for APC

September 28, 2009
Author(s)
Julien M. Amelot, YaShian Li-Baboud
Achieving next-generation factory (NGF) goals has been an industry challenge for APC applications to acquire a sufficient level of data quality to maximize the benefits of automation. For example, it is difficult to get accurate timestamps because sensor

Recommendation for Digital Signature Timeliness

September 23, 2009
Author(s)
Elaine B. Barker
Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless the

Considering Discourse References in Textual Entailment Annotation

September 17, 2009
Author(s)
Luisa Bentivogli, Ido Dagan, Hoa T. Dang, Danilo Giampiccolo, Medea L. Leggio, Bernardo Magnini
In the 2009 Recognizing Textual Entailment (RTE) challenge, a Search Pilot task has been introduced, aimed at finding all the sentences in a corpus which entail a set of given hypotheses. The preparation of the data set for this task has provided an

A Statistical Path Loss Model for Medical Implant Communication Channels

September 16, 2009
Author(s)
Kamran Sayrafian, Wen-Bin Yang, John G. Hagedorn, Judith E. Terrill, Kamya Yazdandoost
Knowledge of the propagation media is a key step toward a successful transceiver design. Such information is typically gathered by conducting physical experiments, measuring and processing the corresponding data to obtain channel characteristics. In case

A 1D Spectral Image Validation/Verification Metric for Fingerprints

August 19, 2009
Author(s)
John M. Libert, John D. Grantham, Shahram Orandi
Image validation and verification are important functions in the acquisition of fingerprint images from live-scan devices and for assessing and maintaining the fidelity of fingerprint image databases. In addition to law enforcement, such databases are used

Users Manual for Version 2.1.5 of the NIST DMIS Test Suite (for DMIS 5.1)

August 19, 2009
Author(s)
Thomas R. Kramer, John A. Horst
The NIST DMIS Test Suite, version 2.1.5, is described. The test suite is intended to serve two purposes, 1) to help users and vendors use version 5.1 of DMIS (the Dimensional Measuring Interface Standard) and 2) to provide utilities and test files for

PRF-Security Revisited With New Efficient Single-Keyed Domain Extensions

August 17, 2009
Author(s)
Mridul Nandi
In this paper, we study a wide class of single-keyed domain extension algorithms, called generalized domain extension (\tx{GDE}), extending a keyed function $F_K : {0,1}^b \to {0,1}^n$ to a keyed function $\overline{F}_K : {0,1}^* \to {0,1}^n$, $K \in {0,1

Use of ISO/IEC 24727

August 14, 2009
Author(s)
Hildegard Ferraiolo, Teresa T. Schwarzhoff, William I. MacGregor, Hung Dang, Ketan Mehta
This document describes the use of ISO/IEC 24727 in enabling client-applications to access identity credentials issued by different credential issuers.

Optimizing Authentication in Media Independent Handovers using IEEE 802.21

August 6, 2009
Author(s)
Antonio Izquierdo Manzanares, Nada T. Golmie, Richard A. Rouil
In this paper we study the performance of the authentication process in media independent handovers, and consider the impact of using IEEE 802.21 link triggers to achieve seamless mobility. We describe all interactions between the 802.21 services and the
Displaying 1251 - 1275 of 2282
Was this page helpful?