NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 21 to 30 of 225 records.
Resort by: Date / Title


21. Report: Authentication Diary Study
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7983
Topic: Cybersecurity
Published: 2/4/2014
Authors: Michelle Potts Steves, Mary Frances Theofanos
Abstract: Users have developed various coping strategies for minimizing or avoiding the friction and burden associated with managing and using their portfolios of user IDs and passwords or personal identification numbers (PINs). Many try to use the same passwo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912430

22. Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit
Topic: Cybersecurity
Published: 2/3/2014
Authors: Chung Tong Hu, Karen Scarfone
Abstract: Access control (AC) policies can be implemented based on different AC models, which are fundamentally composed by semantically independent AC rules in expressions of privilege assignments described by attributes of subjects/attributes, actions, objec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915399

23. The Importance of Entropy to Information Security
Topic: Cybersecurity
Published: 2/3/2014
Authors: Apostol T Vassilev, Timothy Hall
Abstract: The strength of cryptographic keys is an active challenge in academic research and industrial practice. In this paper we discuss the entropy as fundamentally important concept for generating hard-to-guess, i.e., strong, cryptographic keys and outline ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915121

24. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
Topic: Cybersecurity
Published: 1/31/2014
Authors: Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel
Abstract: By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, resear ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914235

25. A Profile of the Key Management Framework for the Federal Government
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/9/2014
Author: Elaine B Barker
Abstract: The Computer Security Division within ITL has recently provided a draft of Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. NIST SP 800-152 is based on NIST SP 800-130, A Fram ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915268

26. A New Standard for Securing Media-Independent Handover: IEEE 802.21a
Topic: Cybersecurity
Published: 12/31/2013
Authors: Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
Abstract: When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914725

27. WS-Biometric Devices
Topic: Cybersecurity
Published: 12/17/2013
Authors: Kevin C Mangold, Ross J Micheals
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914479

28. Taxonomic Rules for Password Policies: Translating the Informal to the Formal Language
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7970
Topic: Cybersecurity
Published: 12/9/2013
Authors: Kevin Killourhy, Yee-Yin Choong, Mary Frances Theofanos
Abstract: A password policy may seem formal in the sense that it is written in a legalistic language, giving the impression of a binding contract. However, such policies are informal in the logical sense that the policy statements are not written in a clear, u ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914627

29. ITL Releases Preliminary Cybersecurity Framework
Series: ITL Bulletin
Topic: Cybersecurity
Published: 11/4/2013
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin announces the release of the Preliminary Cybersecurity Framework and gives instructions for submitting comments.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914990

30. Smart Grid Mesh Network Security Using Dynamic Key Distribution with Merkle Tree 4-Way Handshaking
Topic: Cybersecurity
Published: 10/13/2013
Author: Hamid Gharavi
Abstract: Distributed mesh sensor networks provide cost-effective communications for deployment in various smart grid domains, such as home area networks (HAN), neighborhood area networks (NAN), and substation/plant-generation local area networks. This paper i ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914747



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series