NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity

Displaying records 11 to 20 of 252 records.
Resort by: Date / Title


11. Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56B Rev 1
Topic: Cybersecurity
Published: 10/1/2014
Authors: Elaine B Barker, Lidong Chen, Dustin Moody
Abstract: This Recommendation specifies key-establishment schemes using integer factorization cryptography, based on ANS X9.44, Key-establishment using Integer Factorization Cryptography [ANS X9.44], which was developed by the Accredited Standards Committee (A ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916341

12. Release of NIST Interagency Report 7628 Revision 1, Guidelines for Smart Grid Cybersecurity
Series: ITL Bulletin
Topic: Cybersecurity
Published: 9/29/2014
Authors: Victoria Y Pillitteri, Tanya L Brewer, Larry Feldman, Gregory A. Witte
Abstract: The United States has embarked on a major transformation of its electric power infrastructure. This vast infrastructure upgrade--extending from homes and businesses to fossil-fuel-powered generating plants and wind farms--is central to national effor ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917244

13. Guidelines for Smart Grid Cybersecurity
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7628 Rev 1
Topic: Cybersecurity
Published: 9/25/2014
Authors: Victoria Y Pillitteri, Tanya L Brewer
Abstract: This three-volume report, Guidelines for Smart Grid Cybersecurity, presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of Smart Grid-related character ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916068

14. Computer Security Division 2013 Annual Report
Series: Special Publication (NIST SP)
Report Number: 800-170
Topic: Cybersecurity
Published: 9/4/2014
Authors: Patrick D O'Reilly, Gregory A. Witte, Chris Johnson, Doug Rike
Abstract: Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915764

15. Single-shot security for one-time memories in the isolated qubits model
Topic: Cybersecurity
Published: 8/21/2014
Author: Yi-Kai Liu
Abstract: One-time memories (OTM's) are simple, tamper-resistant cryptographic devices, which can be used to implement sophisticated functionalities such as one-time programs. OTM's cannot exist in a fully-classical world, or in a fully-quantum world, but the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915498

16. The Future of Cybersecurity Education
Topic: Cybersecurity
Published: 8/19/2014
Authors: Ernest Leroy McDuffie, V. P. Piotrowski
Abstract: By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917265

17. Release of NIST Interagency Report 7946, CVSS Implementation Guidance
Series: ITL Bulletin
Topic: Cybersecurity
Published: 7/10/2014
Authors: Harold Booth, Joshua M Franklin, Larry Feldman, Gregory A. Witte
Abstract: The Common Vulnerability Scoring System (CVSS) is an open standard designed to convey severity and risk of information system vulnerabilities. CVSS was commissioned by the National Infrastructure Advisory Council (NIAC) in support of the global Vulne ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916242

18. I Can't Type That! P@$$w0rd Entry on Mobile Devices
Topic: Cybersecurity
Published: 6/22/2014
Authors: Kristen Greene, Melissa A. Gallagher, Brian C Stanton, Paul Y Lee
Abstract: Given the numerous constraints of onscreen keyboards, such as smaller keys and lack of tactile feedback, remembering and typing long, complex passwords , an already burdensome task on desktop computing systems ,becomes nearly unbearable on small ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914910

19. Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach
Series: Special Publication (NIST SP)
Report Number: 800-37 Rev 1
Topic: Cybersecurity
Published: 6/10/2014
Author: Ronald S Ross
Abstract: This publication provides guidelines for applying the Risk Management Framework (RMF) to federal information systems. The six-step RMF includes security categorization, security control selection, security control implementation, security control as ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916094

20. Supplemental Guidance on Ongoing Authorization: Transitioning to Near Real-Time Risk Management
Topic: Cybersecurity
Published: 6/3/2014
Authors: Kelley L Dempsey, Ronald S Ross, Kevin Mcguire Stine
Abstract: Office of Management and Budget (OMB) Memorandum M-14-03, Enhancing the Security of Federal Information and Information Systems, reminds Federal agencies that, "Our nation's security and economic prosperity depend on ensuring the confidentiality, int ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916095



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series