NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 161 to 170 of 229 records.
Resort by: Date / Title


161. Guidelines on Firewalls and Firewall Policy
Series: Special Publication (NIST SP)
Report Number: 800-41rev1
Topic: Cybersecurity
Published: 9/28/2009
Authors: Karen Ann Scarfone, Paul Hoffman
Abstract: Firewalls are devices or programs that control the flow of network traffic between networks or hosts employing differing security postures. This publication provides an overview of several types of firewall technologies and discusses their security ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901083

162. Recommendation for Digital Signature Timeliness
Series: Special Publication (NIST SP)
Report Number: 800-102
Topic: Cybersecurity
Published: 9/23/2009
Author: Elaine B Barker
Abstract: Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901593

163. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56B
Topic: Cybersecurity
Published: 8/28/2009
Authors: Elaine B Barker, Lidong Chen, Andrew Richard Regenscheid, Miles E. Smid
Abstract: [Superseded by SP 800-56B Rev. 1 (September 2014): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916341] This recommendation specifies key establishment schemes using integer factorization cryptography, based on ANS X9 44, Key Establis ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903082

164. Recommended Security Controls for Federal Information Systems and Organizations
Series: Special Publication (NIST SP)
Report Number: 800-53 Rev 3
Topic: Cybersecurity
Published: 8/3/2009
Author: Ronald S Ross
Abstract: **Includes updates through 5/1/2010. [Superseded by NIST SP 800-53, Rev. 4 (April 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913693] The objective of NIST SP 800-53 is to provide a set of security controls that can satisfy th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903280

165. Fast and Secure CBC Type MAC Algorithms
Topic: Cybersecurity
Published: 7/21/2009
Author: Mridul Nandi
Abstract: The CBC-MAC, or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure over an arbitrary domain. There are several secure variants of CBC-MAC, among ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901030

166. Digital Signature Standard (DSS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 186-3
Topic: Cybersecurity
Published: 6/25/2009
Author: Elaine B Barker
Abstract: [Superseded by FIPS 186-4(July 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914162] The Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthori ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902984

167. Static Analysis Tool Exposition (SATE) 2008
Series: Special Publication (NIST SP)
Report Number: 500-279
Topic: Cybersecurity
Published: 6/22/2009
Authors: Vadim Okun, Romain Gaucher, Paul E Black
Abstract: The NIST SAMATE project conducted the first Static Analysis Tool Exposition (SATE) in 2008 to advance research in static analysis tools that find security defects in source code. The main goals of SATE were to enable empirical research based on large ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902679

168. Guide to Enterprise Telework and Remote Access Security
Series: Special Publication (NIST SP)
Report Number: 800-46 Rev 1
Topic: Cybersecurity
Published: 6/16/2009
Authors: Karen Ann Scarfone, Paul Hoffman, Murugiah P Souppaya
Abstract: Many organizations employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an organization s non-public computing resources. The nature ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902685

169. Surviving Insecure IT: Effective Patch Management
Topic: Cybersecurity
Published: 3/21/2009
Authors: Simon Liu, David R Kuhn, Hart Rossman
Abstract: The amount of time to protect enterprise systems against potential vulnerability continues to shrink. Enterprises need an effective patch management mechanism to survive the insecure IT environment. Effective patch management is a systematic and repe ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901613

170. Randomized Hashing for Digital Signatures
Series: Special Publication (NIST SP)
Report Number: 800-106
Topic: Cybersecurity
Published: 2/25/2009
Author: Quynh H Dang
Abstract: NIST-approved digital signature algorithms require the use of an approved cryptographic hash function in the generation and verification of signatures. Approved cryptographic hash functions and digital signature algorithms can be found in FIPS 180-3, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901182



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series