Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1276 - 1300 of 2297

A Statistical Path Loss Model for Medical Implant Communication Channels

September 16, 2009
Author(s)
Kamran Sayrafian, Wen-Bin Yang, John G. Hagedorn, Judith E. Terrill, Kamya Yazdandoost
Knowledge of the propagation media is a key step toward a successful transceiver design. Such information is typically gathered by conducting physical experiments, measuring and processing the corresponding data to obtain channel characteristics. In case

A 1D Spectral Image Validation/Verification Metric for Fingerprints

August 19, 2009
Author(s)
John M. Libert, John D. Grantham, Shahram Orandi
Image validation and verification are important functions in the acquisition of fingerprint images from live-scan devices and for assessing and maintaining the fidelity of fingerprint image databases. In addition to law enforcement, such databases are used

Users Manual for Version 2.1.5 of the NIST DMIS Test Suite (for DMIS 5.1)

August 19, 2009
Author(s)
Thomas R. Kramer, John A. Horst
The NIST DMIS Test Suite, version 2.1.5, is described. The test suite is intended to serve two purposes, 1) to help users and vendors use version 5.1 of DMIS (the Dimensional Measuring Interface Standard) and 2) to provide utilities and test files for

PRF-Security Revisited With New Efficient Single-Keyed Domain Extensions

August 17, 2009
Author(s)
Mridul Nandi
In this paper, we study a wide class of single-keyed domain extension algorithms, called generalized domain extension (\tx{GDE}), extending a keyed function $F_K : {0,1}^b \to {0,1}^n$ to a keyed function $\overline{F}_K : {0,1}^* \to {0,1}^n$, $K \in {0,1

Use of ISO/IEC 24727

August 14, 2009
Author(s)
Hildegard Ferraiolo, Teresa T. Schwarzhoff, William I. MacGregor, Hung Dang, Ketan Mehta
This document describes the use of ISO/IEC 24727 in enabling client-applications to access identity credentials issued by different credential issuers.

Optimizing Authentication in Media Independent Handovers using IEEE 802.21

August 6, 2009
Author(s)
Antonio Izquierdo Manzanares, Nada T. Golmie, Richard A. Rouil
In this paper we study the performance of the authentication process in media independent handovers, and consider the impact of using IEEE 802.21 link triggers to achieve seamless mobility. We describe all interactions between the 802.21 services and the

Facial Shape Analysis and Sizing System

July 24, 2009
Author(s)
Afzal A. Godil
The understanding of shape and size of the human head and faces is vital for design of facial wear products, such as respirators, helmets, eyeglasses and for ergonomic studies. 3D scanning is used to create 3D databases of thousands of humans from

Fast and Secure CBC Type MAC Algorithms

July 21, 2009
Author(s)
Mridul Nandi
The CBC-MAC, or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure over an arbitrary domain. There are several secure variants of CBC-MAC, among which

Security for Enterprise Telework and Remote Access Solutions

June 24, 2009
Author(s)
Karen A. Scarfone
Many people telework (also known as telecommuting), which is the ability for an organization s employees and contractors to perform work from locations other than the organization s facilities. Teleworkers use various client devices, such as desktop and

Vacuum-Gap Capacitors for Low-Loss Superconducting Resonant Circuits

June 16, 2009
Author(s)
Katarina Cicak, Michael S. Allman, Joshua Strong, Kevin Osborn, Raymond W. Simmonds
Low-loss microwave components are used in many superconducting resonant circuits from multiplexed readouts of low-temperature detector arrays to quantum bits. Two-level system (TLS) defects in amorphous dielectric materials cause excess energy loss. In an
Displaying 1276 - 1300 of 2297
Was this page helpful?