NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 171 to 180 of 230 records.
Resort by: Date / Title


171. Randomized Hashing for Digital Signatures
Series: Special Publication (NIST SP)
Report Number: 800-106
Topic: Cybersecurity
Published: 2/25/2009
Author: Quynh H Dang
Abstract: NIST-approved digital signature algorithms require the use of an approved cryptographic hash function in the generation and verification of signatures. Approved cryptographic hash functions and digital signature algorithms can be found in FIPS 180-3, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901182

172. Property Verification for Generic Access Control Models
Topic: Cybersecurity
Published: 12/20/2008
Authors: Chung Tong Hu, David R Kuhn, Tao Xie
Abstract: To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new ge ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51328

173. A Threat Analysis on UOCAVA Voting Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7551
Topic: Cybersecurity
Published: 12/19/2008
Authors: Andrew Richard Regenscheid, Nelson E Hastings
Abstract: This report contains the results of NIST s research into technologies to improve the voting process for United States citizens living overseas. It splits the overseas voting process into three stages: voter registration and ballot request, blank ball ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901171

174. Privacy & Authorization Policies - Validation & Assurance Techniques (Two Chapters for a book, Identity and Policy, by FutureText)
Topic: Cybersecurity
Published: 12/19/2008
Author: Ramaswamy Chandramouli
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152171

175. Recommendation for Key Derivation Using Pseudorandom Functions
Series: Special Publication (NIST SP)
Report Number: 800-108
Topic: Cybersecurity
Published: 11/12/2008
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of additional keying material from a secret key, either established through a key establishment scheme or shared through some other manner, using pseudorandom functions.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900147

176. Guidelines on Cell Phone and PDA Security
Series: Special Publication (NIST SP)
Report Number: 800-124
Topic: Cybersecurity
Published: 11/3/2008
Authors: Wayne Jansen, Karen Ann Scarfone
Abstract: [Superseded by SP 800-124 Rev. 1 (June 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913427] Cell phones and personal digital assistants (PDAs) have become indispensable tools for today's highly mobile workforce. Small and relat ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890048

177. Security Considerations in the System Development Life Cycle
Series: Special Publication (NIST SP)
Report Number: 800-64 Rev 2
Topic: Cybersecurity
Published: 10/16/2008
Authors: Richard L Kissel, Kevin Mcguire Stine, Matthew A Scholl, Hart Rossman, J Fahlsing, Jessica Gulick
Abstract: The purpose of this guideline is to assist agencies in building security into their IT development processes. This should result in more cost-effective, risk-appropriate security control identification, development, and testing. This guide focuses on ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890097

178. Guide to Bluetooth Security
Series: Special Publication (NIST SP)
Report Number: 800-121
Topic: Cybersecurity
Published: 9/30/2008
Authors: Karen Ann Scarfone, John Padgette
Abstract: [Superseded by SP 800-121 Rev. 1 (June 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911133] Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology is used primarily to establish wirel ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890066

179. Technical Guide to Information Security Testing and Assessment
Series: Special Publication (NIST SP)
Report Number: 800-115
Topic: Cybersecurity
Published: 9/30/2008
Authors: Murugiah P Souppaya, Karen Ann Scarfone
Abstract: The purpose of this document is to assist organizations in planning and conducting technical information security tests and examinations, analyzing findings, and developing mitigation strategies. The guide provides practical recommendations for desig ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152164

180. Evidence-Based, Good Enough, and Open
Topic: Cybersecurity
Published: 8/4/2008
Author: Karen Ann Scarfone
Abstract: One of the holy grail questions in computer security is how secure are my organization systems? This paper describes our new approach to answering this question. This approach is distinguished from previous efforts in three ways: 1) uses evide ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890007



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series