ITL Newsletter for May-June 2017

ISSUE 146

May-June 2017

VIEW AS WEBPAGE

information technology laboratory

CULTIVATING TRUST IN IT AND METROLOGY

IN THIS ISSUE

cyber

CYBERSECURITY FRAMEWORK

The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation’s security, economy, and public safety and health at risk. The Cybersecurity Framework is a set of industry standards and best practices to help organizations manage cybersecurity risks. NIST is in the process of updating the Framework.

Read More

NEWS UPDATES

QUANTUM COMPUTERS MAY BE FASTER THAN FIRST THOUGHT

quantum

How fast will a quantum computer be able to calculate? While fully functional versions of these long-sought technological marvels have yet to be built, one theorist at the National Institute of Standards and Technology (NIST) has shown that, if they can be realized, there may be fewer limits to their speed than previously put forth.

Read More

IDENTIFYING FACES IN VIDEO IMAGES IS MAJOR CHALLENGE

blurry people

In movies and television, computers can quickly identify a person in a crowded arena from tiny, grainy video images. But that is often not the reality when it comes to identifying bank robbery perpetrators from security camera video, detecting terrorism suspects in a crowded railway station, or finding desired individuals when searching video archives.

Read More

NATIONAL SOFTWARE REFERENCE LIBRARY EXPANDS TO INCLUDE MOBILE APPS

thumbprint

A group of computer scientists at the National Institute of Standards and Technology (NIST) has been working for more than 15 years on an impossible task: to maintain an up-to-date archive of the world’s software. Because the amount of software in circulation keeps growing, they will never enjoy the satisfaction of completing their assignment. But they have succeeded in creating the largest publicly known collection of its kind in the world.  

Read More

 

STAFF RECOGNITION

Donna Dodson

Congratulations to Donna Dodson, NIST’s chief cybersecurity advisor, for being named one of CyberScoop's 2017 Top Women in Cybersecurity.

Joshua Franklin

Congratulations to Joshua Franklin, Applied Cybersecurity Division, received the Advanced Technology Academic Research Center (ATARC) Mobile Innovation Award for his leadership and technical excellence in the mobile space.

Kevin Stine

Congratulations to Kevin Stine, Chief, Applied Cybersecurity Division, received a 2017 Federal 100 Award from Federal Computer Week. Stine was recognized for his leadership in expanding NIST’s program to address the nation’s cybersecurity challenges and accelerate implementation of standards and best practices in the public and private sectors.

Xiao Tang

Congratulations to Xiao Tang, leader of the Applied and Computational Mathematics Division's Quantum Communications Project, was named Fellow of the American Physical Society (APS) "for outstanding contributions to the development of optical technologies and systems, with application to quantum communications, spectrometry, and digital preservation."

SELECTED NEW PUBLICATIONS

Report on Lightweight Cryptography

NIST-approved cryptographic standards were designed to perform well using general-purpose computers. In recent years, there has been increased deployment of small computing devices that have limited resources with which to implement cryptography. When current NIST-approved algorithms can be engineered to fit into the limited resources of constrained environments, their performance may not be acceptable. For these reasons, NIST started a lightweight cryptography project that was tasked with learning more about the issues and developing a strategy for the standardization of lightweight cryptographic algorithms. This report provides an overview of the lightweight cryptography project at NIST, and describes plans for the standardization of lightweight cryptographic algorithms.

Contactless Fingerprint Devices Usability Test

In the employment of contact fingerprint collection technology, many risks are involved in the use of these systems, such as the transmission of pathogens by the contaminated contact surface of the scanner as well as increased collection times resulting in slower throughput in the overall process. Touchless systems address these concerns but also introduce new challenges related to human factors that may affect the biometric system performance. To examine these issues, it is necessary to study the usability of the contactless fingerprinting devices in terms of: ergonomics and anthropometrics, affordance, accessibility, and user satisfaction.

Face in Video Evaluation: Performance of Face Recognition Algorithms on Non-Cooperative Video

This report documents the Face in Video Evaluation (FIVE), an independent, public test of face recognition of non-cooperating subjects who are recorded passively and are mostly oblivious to the presence of cameras. The report enumerates accuracy and speed of face recognition algorithms applied to the identification of persons appearing in video sequences drawn from six different video datasets mostly sequestered at NIST.

Applied and Computational Mathematics Division, Summary of Activities for Fiscal Year 2016

This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST). Part I (Overview) provides a high-level overview of the Divisions activities, including highlights of technical accomplishments during the previous year. Part II (Features) provides further details on three projects of particular note this year. This is followed in Part III (Project Summaries) by brief synopses of all technical projects active during the past year. Part IV (Activity Data) provides listings of publications, technical talks, and other professional activities in which Division staff members have participated. The reporting period covered by this document is October 2015 through December 2016.

CONFERENCE CALENDAR

MAY- JUNE

MAY

9

NSCI Seminar: Supercomputers and Superintelligence

READ MORE

MAY

 16-17

Cybersecurity Framework Workshop

READ MORE

JUNE

17

FISSEA Annual Meeting

READ MORE


for more events click on calendar