NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 151 to 160 of 244 records.
Resort by: Date / Title


151. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
Series: Special Publication (NIST SP)
Report Number: 800-122
Topic: Cybersecurity
Published: 4/6/2010
Authors: Erika McCallister, Timothy Grance, Karen Ann Scarfone
Abstract: The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. The document explains the importance of protecting the confidentiality of PII in the con ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904990

152. On Hash Functions Using Checksums
Topic: Cybersecurity
Published: 4/1/2010
Authors: Praveen Gauruvarum, John M Kelsey, L. Knudsen, S. Thomsen
Abstract: We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one- way checksum fun ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902682

153. Revised Guide Helps Federal Organizations Improve Their Risk Management Practices and Information System Security
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/29/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-37, Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. Developed by NIST in partnership ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905359

154. Computer Security Division 2009 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7653
Topic: Cybersecurity
Published: 3/23/2010
Author: Patrick D O'Reilly
Abstract: This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2009. It discusses all projects and programs within the Division, staff highlights, and publication ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905148

155. Secure Management of Keys in Cryptographic Applications: Guidance for Organizations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 2/24/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905108

156. Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach
Series: Special Publication (NIST SP)
Report Number: 800-37 Rev 1
Topic: Cybersecurity
Published: 2/22/2010
Authors: Ronald S Ross, L A. Johnson
Abstract: [Superseded by SP 800-37 Rev. 1 (February 2010, w/updates through 6/5/2014): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916094] The purpose of SP 800-37 Rev 1 is to provide guidelines for applying the Risk Management Framework to fe ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904985

157. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-2
Topic: Cybersecurity
Published: 2/19/2010
Authors: William T Polk, Donna F Dodson, William E. (William E.) Burr
Abstract: [Superseded by SP 800-78-3 (December 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907537] This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201 as wel ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904962

158. Interfaces for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-73-3
Topic: Cybersecurity
Published: 2/19/2010
Authors: Ramaswamy Chandramouli, David A Cooper, James F Dray Jr, Hildegard Ferraiolo, Scott Guthery, William I. MacGregor, Ketan Mehta
Abstract: FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors, defines procedures for the PIV lifecycle activities including identity proofing, registration, PIV Card issuance, and PIV Card usage. FIPS 201 also specifies that th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904797

159. A Model of Joint Congestion Control and Routing Through Random Assignment of Paths
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7590
Topic: Cybersecurity
Published: 2/16/2010
Authors: Fern Y Hunt, Vladimir V Marbukh
Abstract: We investigate the trade-off between utility and path diversity in a model of congestion control where there can be multiple routes between two locations in a network The model contains a random route allocation scheme for each source s (user or TCP ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902537

160. Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices
Series: Special Publication (NIST SP)
Report Number: 800-38E
Topic: Cybersecurity
Published: 1/18/2010
Author: Morris J Dworkin
Abstract: This document approves the XTS-AES mode of the AES algorithm by reference to IEEE Std 1619-2007, subject to one additional requirement, as an option for protecting the confidentiality of data on storage devices. The mode does not provide authenticat ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904691



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series