Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||William E. Burr; Hildegard Ferraiolo; David A. Waltermire;|
|Title:||NIST and Computer Security|
|Published:||April 04, 2014|
|Abstract:||The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and information security at both national and global levels. This article is part of a special issue on NIST contributions to IT.|
|Citation:||IEEE IT Professional|
|Pages:||pp. 31 - 37|
|Keywords:||authentication, cryptographic competition, e-commerce, hash function, identity, mobile device authentication, Security Content Automation, smart card|
|Research Areas:||Information Technology, Computer Security, Cybersecurity|
|DOI:||http://dx.doi.org/10.1109/MITP.2013.88 (Note: May link to a non-U.S. Government webpage)|
|PDF version:||Click here to retrieve PDF version of paper (121KB)|