NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity

Displaying records 51 to 60 of 122 records.
Resort by: Date / Title


51. NIST Test Personal Identity Verification (PIV) Cards
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7870
Topic: Cybersecurity
Published: 7/12/2012
Author: David A Cooper
Abstract: In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, NIST has developed a set of test PIV Cards and a supporting public key infrastructure. This set of test cards includes ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911544

52. Guide to Bluetooth Security
Series: Special Publication (NIST SP)
Report Number: 800-121 Rev 1
Topic: Cybersecurity
Published: 6/11/2012
Authors: Karen Ann Scarfone, John Padgette, Lidong Chen
Abstract: Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology is used primarily to establish wireless personal area networks. It has been integrated into many types of business and consumer devices, including cellu ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911133

53. Cloud Computing Synopsis and Recommendations
Series: Special Publication (NIST SP)
Report Number: 800-146
Topic: Cybersecurity
Published: 5/29/2012
Authors: Mark L Badger, Timothy Grance, Robert Patt-Corner, Jeffrey Mark Voas
Abstract: This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911075

54. Basing Cybersecurity Training on User Perceptions
Topic: Cybersecurity
Published: 4/2/2012
Authors: Susanne M Furman, Mary Frances Theofanos, Yee-Yin Choong, Brian C Stanton
Abstract: The National Initiative for Cybersecurity Education (NICE) will be conducting a nationwide awareness and outreach program to effect behavioral change. To be effective, an educational campaign must first understand users‰ perceptions of computer and ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909994

55. Improved Indifferentiability Security Bound for the JH Mode
Topic: Cybersecurity
Published: 3/22/2012
Authors: Dustin Moody, Souradyuti Paul, Daniel C Smith-Tone
Abstract: The JH hash function is one of the five fi nalists of the ongoing NIST SHA3 hash function competition. Despite several earlier attempts, and years of analysis, the indi fferentiability security bound of the JH mode has so far remained remarkably lo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910702

56. Guidelines for Securing Wireless Local Area Networks (WLANs)
Series: Special Publication (NIST SP)
Report Number: 800-153
Topic: Cybersecurity
Published: 2/21/2012
Authors: Murugiah P Souppaya, Karen Ann Scarfone
Abstract: A wireless local area network (WLAN) is a group of wireless networking devices within a limited geographic area, such as an office building, that exchange data through radio communications. The security of each WLAN is heavily dependent on how well e ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910174

57. Building Security into Off-the-Shelf Smartphones
Topic: Cybersecurity
Published: 2/1/2012
Authors: Angelos Stavrou, Jeffrey Mark Voas, Athanasios T Karygiannis, Stephen Quirolgico
Abstract: Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smart-phone devices are used for everyday activities that range from Maps and Geo-location tagging to banking. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909685

58. Guidelines on Security and Privacy in Public Cloud Computing
Series: Special Publication (NIST SP)
Report Number: 800-144
Topic: Cybersecurity
Published: 12/9/2011
Authors: Timothy Grance, Wayne Jansen
Abstract: Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services fro ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909494

59. Recommendation for Key Derivation through Extraction-then-Expansion
Series: Special Publication (NIST SP)
Report Number: 800-56C
Topic: Cybersecurity
Published: 11/28/2011
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key establishment scheme defined in NIST Special Publications 800-56A or 800-56B through an extraction-then-expansion procedure ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909679

60. Report on the Third Static Analysis Tool Exposition (SATE 2010)
Series: Special Publication (NIST SP)
Report Number: 500-283
Topic: Cybersecurity
Published: 10/27/2011
Authors: Vadim Okun, Paul E Black, Aurelien Michel Dominique Delaitre
Abstract: The NIST Software Assurance Metrics And Tool Evaluation (SAMATE) project conducted the third Static Analysis Tool Exposition (SATE) in 2010 to advance research in static analysis tools that find security defects in source code. The main goals of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909407



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series