NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 211 to 220 of 230 records.
Resort by: Date / Title


211. Personal Identity Verification (PIV) of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201-1
Topic: Cybersecurity
Published: 6/26/2006
Authors: William I. MacGregor, Ketan Mehta
Abstract: [Superseded by FIPS 201-2(August 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914530] This document was developed to satisfy the requirements of HSPD-12, approved by the Secretary of Commerce, and issued on March 2006. This cha ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50836

212. Targeted Search: Reducing the Time and Cost for Searching for Objects in Multi-Server Networks
Topic: Cybersecurity
Published: 4/9/2006
Author: Allen L Roginsky
Abstract: In many applications - including P2P file sharing, content distribution networks, and grid computing - a single object will be searched for in multiple servers. In this paper, we find the provably optimal search method for such applications and deve ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150231

213. Computer Security Division 2005 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7285
Topic: Cybersecurity
Published: 2/1/2006
Authors: Tanya L Brewer, Matthew A Scholl
Abstract: This report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during the Fiscal Year 2005. It discusses all projects and programs within the Division, staff highlights, and publications. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150590

214. Cryptographic Primitives Can Be Fragile
Topic: Cybersecurity
Published: 1/3/2006
Author: Rene C Peralta
Abstract: We show that a well-known coin-flipping protocol is breakable in the sense that one of the parties can pre-determine the result of the coin-flip. The way in which the protocol fails is illustrative of the fact that there are insecure ways of using se ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150385

215. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81
Topic: Cybersecurity
Published: 1/1/2006
Authors: Ramaswamy Chandramouli, Scott William Rose
Abstract: [Superseded by SP 800-81 Rev. 1 (April 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113] We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) finger ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150200

216. Guide to Malware Incident Prevention and Handling
Series: Special Publication (NIST SP)
Report Number: 800-83
Topic: Cybersecurity
Published: 11/23/2005
Authors: Peter M Mell, Karen Kent, Joseph Nusbaum
Abstract: [Superseded by SP 800-83 Rev. 1 (July 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913930] This publication provides recommendations for improving an organizations malware incident prevention measures. It also gives extensive ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150416

217. Recommendation for Key Management - Part 2: Best Practices for Key Management Organization
Series: Special Publication (NIST SP)
Report Number: 800-57
Topic: Cybersecurity
Published: 8/25/2005
Authors: William C Barker, Elaine B Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: Best Practices for Key Management Organization, Part 2 of the Recommendation for Key Management is intended primarily to address the needs of system owners and managers. It provides context, principles, and implementation guidelines to assist in imp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151315

218. Computer Security Division 2004 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7219
Topic: Cybersecurity
Published: 8/1/2005
Author: Tanya L Brewer
Abstract: This report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2004. It discusses all projects and programs within the Division, staff highlights, and publications. Fo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151309

219. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78
Topic: Cybersecurity
Published: 4/25/2005
Authors: William T Polk, Donna F Dodson, William Edward Burr
Abstract: [Superseded by SP 800-78-1 (August 2007): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51215] The Homeland Security Presidential Directive (HSPD) 12 mandated the creation of new standards for interoperable identity credentials for phy ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917454

220. An Overview and Analysis of PDA Forensic Tools
Topic: Cybersecurity
Published: 4/2/2005
Authors: Wayne Jansen, Richard P Ayers
Abstract: Mobile handheld devices are becoming evermore affordable and commonplace in society. When they are involved in a security incident or crime, forensic specialists require tools that allow proper extraction and speedy examination of any digital evidenc ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150216



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series