NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 191 to 200 of 228 records.
Resort by: Date / Title


191. New Cryptographic Hash Algorithm Family: NIST Holds a Public Competition to Find New Algorithms
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/28/2008
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that was disseminated by the National Institute of Standards and Technology (NIST) in a November 2007 Federal Register Notice. NIST is soliciting candidates for a new and robust cryptographic hash algorithm f ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152172

192. Managing Risk from Information Systems - Second Public Draft
Series: Special Publication (NIST SP)
Report Number: 800-39
Topic: Cybersecurity
Published: 4/9/2008
Authors: Ronald S Ross, Stuart William Katzke, Marianne M. Swanson, L A. Johnson, G Stoneburner
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906396

193. Computer Security Division 2007 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7442
Topic: Cybersecurity
Published: 4/1/2008
Authors: Kevin Mcguire Stine, Mark Wilson
Abstract: Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150677

194. Handling Computer Security Incidents: NIST Issues Updated Guidelines
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/27/2008
Author: Shirley M. Radack
Abstract: This bulletin summarizes information disseminated in revised NIST Special Publication (SP) 800-61-1, Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology. Written by Karen Scarfone and Tim ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152110

195. Secure Biometric Match-on-Card Feasibility Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7452
Topic: Cybersecurity
Published: 11/30/2007
Authors: David A Cooper, Trung-Hung Dang, Philip Lee, William I. MacGregor, Ketan Mehta
Abstract: FIPS 201, "Personal Identity Verification (PIV) of Federal Employees and Contractors," and its associated special publications define a method to perform biometric match-off-card authentication of a PIV cardholder when the PIV card is inserted into ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51278

196. User's Guide to Securing External Devices for Telework and Remote Access
Series: Special Publication (NIST SP)
Report Number: 800-114
Topic: Cybersecurity
Published: 11/1/2007
Authors: Karen Ann Scarfone, Murugiah P Souppaya
Abstract: This publication helps teleworkers secure the external devices they use for telework, such as personally owned and privately owned desktop and laptop computers and consumer devices (e.g., cell phones, personal digital assistants [PDA]). The document ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151340

197. Metastability of Fair Bandwidth Sharing Under Fluctuating Demand and Necessity of Flow Admission control
Topic: Cybersecurity
Published: 9/17/2007
Author: Vladimir V Marbukh
Abstract: A flow-level Markov model for fair bandwidth sharing with packet retransmissions under random flow arrivals/departures is proposed and discussed. Fluctuations in the numbers of flows in progress cause the network instability even under light load. Th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51233

198. Fair Bandwidth Sharing Under Flow Arrivals/Departures: Effect of Retransmissions on Stability and Performance
Topic: Cybersecurity
Published: 9/1/2007
Author: Vladimir V Marbukh
Abstract: A flow-level Markov model for fair bandwidth sharing with packet retransmissions and random flow arrivals/departures is proposed. The model accounts for retransmissions by assuming that file transfer rates are determined by the end-to-end goodputs ra ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51246

199. Where EAP Security Claims Fail
Topic: Cybersecurity
Published: 8/14/2007
Authors: Katrin Hoeper, Lei Chen
Abstract: The Extensible Authentication Protocol (EAP) is widely used as an authentication framework to control the access to wireless networks, e.g. in IEEE 802.11 and IEEE 802.16 networks. In this paper, we discuss limitations of EAP security and demonstrate ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51151

200. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-1
Topic: Cybersecurity
Published: 8/1/2007
Authors: William T Polk, Donna F Dodson, William Edward Burr
Abstract: [Superseded by SP 800-78-2(February 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904962] SP 800-78-1 has been modified to enhance interoperability, simplify the development of relying party applications, and enhance alignment w ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51215



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series