NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 61 to 70 of 210 records.
Resort by: Date / Title


61. Building Security into Off-the-Shelf Smartphones
Topic: Cybersecurity
Published: 2/1/2012
Authors: Angelos Stavrou, Jeffrey Mark Voas, Athanasios T Karygiannis, Stephen Quirolgico
Abstract: Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smart-phone devices are used for everyday activities that range from Maps and Geo-location tagging to banking. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909685

62. Advancing Security Automation and Standardization: Revised Technical Specifications Issued for the Security Content Automation Protocol (SCAP)
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/24/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-126 Rev. 2, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2. This publication was written by David Waltermire an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910245

63. Revised Guideline for Electronic Authentication of Users Helps Organizations Protect the Security of their Information Systems
Series: ITL Bulletin
Topic: Cybersecurity
Published: 12/22/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-63-1, Electronic Authentication Guideline. This revised guideline, which supersedes an earlier guideline, NIST SP 800-63, updates information about, and recommend ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910388

64. Guidelines on Security and Privacy in Public Cloud Computing
Series: Special Publication (NIST SP)
Report Number: 800-144
Topic: Cybersecurity
Published: 12/9/2011
Authors: Timothy Grance, Wayne Jansen
Abstract: Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services fro ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909494

65. A depth-16 circuit for the AES S-box
Topic: Cybersecurity
Published: 12/1/2011
Authors: Joan Boyar, Rene C Peralta
Abstract: New techniques for reducing the depth of circuits for cryptographic applications are described and applied to the AES S-box. These techniques also keep the number of gates quite small. The result, when applied to the AES S-box, is a circuit with de ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908382

66. NIST SP 800-56C: Recommendation for Key Derivation through Extraction-then-Expansion
Series: Special Publication (NIST SP)
Report Number: 800-56
Topic: Cybersecurity
Published: 11/28/2011
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key establishment scheme defined in NIST Special Publications 800-56A or 800-56B through an extraction-then-expansion procedure ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909679

67. Service Model Driven Variations in Security Measures for Cloud Environments
Topic: Cybersecurity
Published: 11/6/2011
Author: Ramaswamy Chandramouli
Abstract: With the increasing adoption of cloud computing service models ‹ Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has bec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909131

68. Mobile-App Addiction: Threat to Security?
Topic: Cybersecurity
Published: 11/1/2011
Authors: Jeffrey Mark Voas, Keith Miller, George Hurlburt
Abstract: Mobile Apps are quickly becoming the largest platform for consumers to access software functionalty. This paper looks at the history of computing that has lead up to this paradigm shift and the security ramifications of it.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907101

69. The National Strategy for Trusted Identities in Cyberspace (Enhancing Online Choice, Efficiency, Security, and Privacy through Standards)
Topic: Cybersecurity
Published: 11/1/2011
Author: Jeremy A Grant
Abstract: Dear Password, It‰s time for you to retire. You‰ve served us well, but the reality is that you‰re woefully outdated and fundamentally insecure. Moreover, our reliance on you is making it difficult to move some very interesting and valuable types of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909550

70. Report on the Third Static Analysis Tool Exposition (SATE 2010)
Series: Special Publication (NIST SP)
Report Number: 500-283
Topic: Cybersecurity
Published: 10/27/2011
Authors: Vadim Okun, Paul E Black, Aurelien Michel Dominique Delaitre
Abstract: The NIST Software Assurance Metrics And Tool Evaluation (SAMATE) project conducted the third Static Analysis Tool Exposition (SATE) in 2010 to advance research in static analysis tools that find security defects in source code. The main goals of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909407



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series